GestioIP 3.5.7 Vulnerability: When DNS Keys Go Rogue with XSS Attacks!
Ah, the glamorous world of cybersecurity—where even a DNS key can be a ticking time bomb! GestioIP 3.5.7 has a Stored XSS vulnerability that lets authenticated users inject malicious code into the tsig_key field. Perfect for those days when you feel like spicing up your network security with a dash of chaos!

Hot Take:
Looks like the folks over at GestioIP have a bit of a sticky situation on their hands, and no, it’s not a new type of digital adhesive. It’s another episode of “Oops, my software has a Stored XSS vulnerability,” starring some nefarious scripts eager to play a game of peek-a-boo with your data! Let’s dive into the world of cross-site scripting, where hackers and developers engage in a high-stakes game of cat and mouse. Spoiler alert: this time, the mouse has a script tag!
Key Points:
- GestioIP 3.5.7 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability.
- The vulnerability resides in the “DNS Key” feature, specifically the “tsig_key” form field.
- An authenticated attacker can inject malicious code affecting all users accessing the “DNS Key” page.
- Admins should keep an eye on their cookies, as they might be stolen using sneaky scripts.
- The exploit requires specific group permissions, usually held by Admin and GestioIP Admin groups.