stored XSS in concrete5 5.7.2.1

Disclosed: 2016-04-26 23:28:43 By yujitounai To concretecms
Unknown
Vulnerability Details
Hello. I found stored XSS in concrete5 5.7.2.1. If the user have file upload permission the user can upload the file named like "><img src=0 onerror=confirm(document.cookie)>.txt or change title like below <svg onload=confirm(document.cookie)> on the properties page. and when other user access the file manager page, and open the delete page or open the properties page, Javascript execute. I reported same issue in 5.7.0.4. and fixed [#30019] but this fix is not sufficient. Regards.
Actions
View on HackerOne
Report Stats
  • Report ID: 38890
  • State: Closed
  • Substate: resolved
  • Upvotes: 3
Share this report