concretecms / concrete5-legacy

Legacy repository for concrete5
http://www.concrete5.org
559 stars 323 forks source link

concrete5 – Cross-Site Scripting (XSS) in “selector_data.php” #1948

Closed bestshow closed 7 years ago

bestshow commented 7 years ago

Product: concrete5 Download: https://github.com/concrete5/concrete5-legacy Vunlerable Version: 5.6.3.4 and probably prior Tested Version: 5.6.3.4 Author: ADLab of Venustech

Advisory Details: A Cross-Site Scripting (XSS) was discovered in “concrete5 5.6.3.4”, which can be exploited to execute arbitrary code. The vulnerability exists due to insufficient filtration of user-supplied data in the “fID” HTTP GET parameter passed to the “concrete5-legacy-master/web/concrete/tools/files/selector_data.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox: Poc: http://localhost/.../concrete5-legacy-master/web/concrete/tools/files/selector_data.php?fID=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22

Mnkras commented 7 years ago

DO NOT POST SECURITY ISSUES ON GITHUB

We have a disclosure process for concrete5. Please follow the instructs outlined on our security page.

http://www.concrete5.org/developers/security