Cross-Site Scripting in getMarketplacePurchaseFrame

Disclosed: 2014-08-18 16:56:20 By melvin To concretecms
Unknown
Vulnerability Details
The `$mp->getProductBlockID()` variable in the `getMarketplacePurchaseFrame` function ([view on Github](https://github.com/concrete5/concrete5/blob/851806af393fa2958d52db9b48e0a8c83100f609/web/concrete/core/libraries/marketplace.php#L176)) is not being filtered properly to protect against HTML injection/XSS. This leads to XSS vulnerabilities in (for example) `connect.php` on line 14 ([view on Github](https://github.com/concrete5/concrete5/blob/851806af393fa2958d52db9b48e0a8c83100f609/web/concrete/single_pages/dashboard/extend/connect.php#L14)) when visiting a URL like: *dashboard/extend/connect/"%20onmouseover="alert(document.cookie)">*.
Actions
View on HackerOne
Report Stats
  • Report ID: 6843
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report