Stored XSS in Name field in User Groups/Group Details form
Low
C
Concrete CMS
Submitted None
Actions:
Reported by
bl4de
Vulnerability Details
Technical details and impact analysis
## Intro
"The Crayons of Madagascar"
__Type of issue__: Core CMS issue
__Level of severity__: Internal Attack Vector
__Concrete5 version__: 8.2.0 RC2 rev. 32c9daf352645d4fafedb7b956e7f2de4e153ab3
## Summary
There is Stored XSS vulnerability in User Groups->Group Details ```Name``` field. This vulnerability might be used to perform internal attack against other concrete5 users with permissions to view User Groups list.
To execute this vulnerability, user has to be tricked to perform some additional actions or attacker has to wait until user will perform those action.
## Steps to reproduce
- log in to concrete5 instance
- go to Members->User Groups and use existing group or add new one for the next step
- in groups list click selected group and select ```Edit Group``` option from dropdown menu
{F201525}
- in ```Name``` field, put the following payload:
```
locals" onclick=alert('XSS!') "'>
```
- save changes by clicking ```Update Group``` button.
```Name``` field is properly sanitized in (almost) all context is used.
Except one.
On the User Groups screen, use seacrh feature to find ```locals``` group (put ```locals``` into seacrh field and press Enter):
{F201526}
Click on the link. Malicious payload will be executed:
{F201527}
## Impact
This internal attack allows to execute malicious JavaScript agains other panel users. Impact of this attack is very limited, however still should be considered as potential (very low) security issue.
## Testing environment
System:
- Concrete5 version 8.2.0 RC2, commit 32c9daf352645d4fafedb7b956e7f2de4e153ab3, installed localy
- PHP ver. 5.6.30
- Apache HTTP Server 2.4.25 for macOS
- MySQL ver. 5.7.13 for macOS
This vulnerability was tested on macOS Sierra 10.12.5 with following browsers:
- Chrome 59.0.3071.115
- Chromium build 61.0.3131.0
- Opera 46.0.2597.32
## Wrap up
I hope my report will help keep Concrete5 safe in the future.
Best Regards,
Rafal 'bl4de' Janicki
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored