15 lines
No EOL
891 B
Text
Executable file
15 lines
No EOL
891 B
Text
Executable file
source: http://www.securityfocus.com/bid/53640/info
|
|
|
|
Concrete CMS is prone to following vulnerabilities because it fails to properly handle user-supplied input.
|
|
|
|
1. Multiple cross-site scripting vulnerabilities
|
|
|
|
2. An arbitrary-file-upload vulnerability
|
|
|
|
3. A denial-of-service vulnerability
|
|
|
|
An attacker may leverage these issues to cause denial-of-service conditions or to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
|
|
|
Concrete CMS versions 5.5 and 5.5.21 are vulnerable.
|
|
|
|
http://www.example.com/learn/concrete/concrete5.5.2.1/index.php/tools/required/dashboard/sitemap_data.php?instance_id="><script>alert(1);</script>&node=owned&display_mode=full&select_mode=&selectedPageID= |