A Cross-Site Scripting (XSS) was discovered in Gazelle before 2017-03-19. The vulnerability exists due to insufficient filtration of user-supplied data (type) passed to the 'Gazelle-master/sections/better/transcode.php' URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/WhatCD/Gazelle/issues/111 | issue tracking third party advisory patch |
https://github.com/scriptzteam/Gazelle---Torrent-Tracker-ANTi-XSS | third party advisory mitigation |
http://www.securityfocus.com/bid/97063 | vdb entry third party advisory |