Описание
Concrete CMS vulnerable to cross-site scripting (XSS)
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header. This is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-7725
- https://hackerone.com/reports/148300
- https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html
- https://web.archive.org/web/20210124030008/https://www.securityfocus.com/bid/97649
- https://www.exploit-db.com/exploits/41885
- http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt
Пакеты
concrete5/concrete5
<= 8.1.0
Отсутствует
Связанные уязвимости
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.