Stored XSS on express entries
Low
C
Concrete CMS
Submitted None
Actions:
Reported by
solov9ev
Vulnerability Details
Technical details and impact analysis
1. Download Concrete5 8.5.2 and install it
2. Log into your Concrete5 instance as admin
3. Go to Dashboard > System settings > Express entities (/index.php/dashboard/system/express/entities)
4. Сlick on the **Create** button
5. in the field **Name** paste the following text: `</h1><script>alert(1)</script><h1>`
6. Go to tab **View Objects**
## Impact
If the user was added to the group of administrators, then he can create an express object with a payload in the name and give a link to another administrator to view the created object.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored