Loading HuntDB...

Stored XSS on express entries

Low
C
Concrete CMS
Submitted None
Reported by solov9ev

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
1. Download Concrete5 8.5.2 and install it 2. Log into your Concrete5 instance as admin 3. Go to Dashboard > System settings > Express entities (/index.php/dashboard/system/express/entities) 4. Сlick on the **Create** button 5. in the field **Name** paste the following text: `</h1><script>alert(1)</script><h1>` 6. Go to tab **View Objects** ## Impact If the user was added to the group of administrators, then he can create an express object with a payload in the name and give a link to another administrator to view the created object.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored