Stored XSS in the file search filter
Low
C
Concrete CMS
Submitted None
Actions:
Reported by
solov9ev
Vulnerability Details
Technical details and impact analysis
1. Download Concrete5 8.5.2 and install it
2. Log into your Concrete5 instance as admin
3. Go to Dashboard >Files > Search
4. In the file search bar, click **Advanced**
5. In the window that appears, enter a phrase and click the save button, paste the following payload: `<img src=1 onerror=alert(1)>` and click the save button
6. In the filter search bar, click **Edit** and wait for the malicious code to execute
## Impact
If a user has been added to the administrators group, then he can create a malicious filter and wait for someone else to change this filter
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Stored