XSS in select attribute options
Low
C
Concrete CMS
Submitted None
Actions:
Reported by
sunny0day
Vulnerability Details
Technical details and impact analysis
## To reproduce
1. Create a new select attribute.
2. Add a select attribute option with value `<script>alert('XSS')</script>` and hit Save.
3. Edit the newly created attribute again and see XSS dialog.
The vulnerability lays in the type_form.php file, see https://github.com/concrete5/concrete5/blob/develop/concrete/attributes/select/type_form.php#L40
## Unauthenticated use
The vuln can be pretty bad if the website has an Express Form with select attribute associated with it that "Allow users to add to this list.". In that case, an (unauthenticated) user can submit a form that results to stored XSS.
## Screenshot
{F653172}
## Impact
Stored XSS on /index.php/dashboard/pages/attributes/edit/xxx page and when editing an Express Form block.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored