GHSA-2mvg-c6mg-3q63

Suggest an improvement
Source
https://github.com/advisories/GHSA-2mvg-c6mg-3q63
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2mvg-c6mg-3q63/GHSA-2mvg-c6mg-3q63.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2mvg-c6mg-3q63
Aliases
Published
2022-05-13T01:08:38Z
Modified
2024-02-19T05:24:24.430317Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Concrete CMS vulnerable to cross-site scripting (XSS)
Details

concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header. This is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.

Database specific
{
    "nvd_published_at": "2017-04-13T17:59:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-25T22:28:42Z"
}
References

Affected packages

Packagist / concrete5/concrete5

Package

Name
concrete5/concrete5
Purl
pkg:composer/concrete5/concrete5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
8.1.0

Affected versions

8.*

8.0
8.0.1
8.0.2
8.0.3
8.1.0