Loading HuntDB...

Content Spoofing possible in concrete5.org

C
Concrete CMS
Submitted None
Reported by csanuragjain

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
An attacker can include any arbitrary text using specially crafted concrete5 url. This is done using character /%0d%0a. **Input** https://www.concrete5.org/%0d%0ahas%20moved%20to%20www.evil.com.Please%20visit%20evil.com%20Present%20resource **Output** The requested URL / has moved to www.evil.com.Please visit evil.com Present resource was not found on this server. This attacks are difficult to perform but they may spoof the user in downloading malwares since user believes the text to be coming from yelp site.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Violation of Secure Design Principles