Content Spoofing possible in concrete5.org
Unknown
Vulnerability Details
An attacker can include any arbitrary text using specially crafted concrete5 url.
This is done using character /%0d%0a.
**Input**
https://www.concrete5.org/%0d%0ahas%20moved%20to%20www.evil.com.Please%20visit%20evil.com%20Present%20resource
**Output**
The requested URL / has moved to www.evil.com.Please visit evil.com Present resource was not found on this server.
This attacks are difficult to perform but they may spoof the user in downloading malwares since user believes the text to be coming from yelp site.
Actions
View on HackerOneReport Stats
- Report ID: 168078
- State: Closed
- Substate: resolved
- Upvotes: 2