Content Spoofing possible in concrete5.org
C
Concrete CMS
Submitted None
Actions:
Reported by
csanuragjain
Vulnerability Details
Technical details and impact analysis
An attacker can include any arbitrary text using specially crafted concrete5 url.
This is done using character /%0d%0a.
**Input**
https://www.concrete5.org/%0d%0ahas%20moved%20to%20www.evil.com.Please%20visit%20evil.com%20Present%20resource
**Output**
The requested URL / has moved to www.evil.com.Please visit evil.com Present resource was not found on this server.
This attacks are difficult to perform but they may spoof the user in downloading malwares since user believes the text to be coming from yelp site.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Violation of Secure Design Principles