Stored XSS in the file search filter

Disclosed: 2020-07-03 19:51:36 By solov9ev To concretecms
Low
Vulnerability Details
1. Download Concrete5 8.5.2 and install it 2. Log into your Concrete5 instance as admin 3. Go to Dashboard >Files > Search 4. In the file search bar, click **Advanced** 5. In the window that appears, enter a phrase and click the save button, paste the following payload: `<img src=1 onerror=alert(1)>` and click the save button 6. In the filter search bar, click **Edit** and wait for the malicious code to execute ## Impact If a user has been added to the administrators group, then he can create a malicious filter and wait for someone else to change this filter
Actions
View on HackerOne
Report Stats
  • Report ID: 873584
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report