Description
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0673 | Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N. |
Github GHSA |
GHSA-mgp6-j658-vcw9 | Concrete CMS vulnerable to stored XSS in file tags and description attributes |
References
History
No history.
Status: PUBLISHED
Assigner: ConcreteCMS
Published:
Updated: 2024-08-19T16:13:40.880Z
Reserved: 2024-02-06T00:50:41.232Z
Link: CVE-2024-1245
Updated: 2024-08-01T18:33:25.326Z
Status : Modified
Published: 2024-02-09T20:15:54.370
Modified: 2024-11-21T08:50:08.740
Link: CVE-2024-1245
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA