Loading HuntDB...

Stored XSS in the file search filter

Low
C
Concrete CMS
Submitted None
Reported by solov9ev

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
1. Download Concrete5 8.5.2 and install it 2. Log into your Concrete5 instance as admin 3. Go to Dashboard >Files > Search 4. In the file search bar, click **Advanced** 5. In the window that appears, enter a phrase and click the save button, paste the following payload: `<img src=1 onerror=alert(1)>` and click the save button 6. In the filter search bar, click **Edit** and wait for the malicious code to execute ## Impact If a user has been added to the administrators group, then he can create a malicious filter and wait for someone else to change this filter

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored