ghsa-xwrh-qxmc-x8c8
Vulnerability from github
Published
2024-04-03 21:31
Modified
2024-04-03 21:53
Severity ?
VLAI Severity ?
Summary
Concrete CMS Cross-site Scripting (XSS) in the Advanced File Search Filter
Details
Concrete CMS versions 9 below 9.2.8 and versions below 8.5.16 are vulnerable to Cross-site Scripting (XSS) in the Advanced File Search Filter. Prior to the fix, a rogue administrator could add malicious code in the file manager because of insufficient validation of administrator provided data. All administrators have access to the File Manager and hence could create a search filter with the malicious code attached. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "concrete5/concrete5" }, "ranges": [ { "events": [ { "introduced": "9.0.0RC1" }, { "fixed": "9.2.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "concrete5/concrete5" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "8.5.16" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-3178" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-04-03T21:52:33Z", "nvd_published_at": "2024-04-03T19:15:44Z", "severity": "LOW" }, "details": "Concrete CMS versions 9 below 9.2.8 and versions below\u00a08.5.16 are vulnerable to\u00a0Cross-site Scripting (XSS) in the Advanced File Search Filter.\u00a0Prior to the fix, a rogue administrator could add malicious code in the file manager because of insufficient validation of administrator provided data. All administrators have access to the File Manager and hence could create a search filter with the malicious code attached. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0\u00a0\n\n", "id": "GHSA-xwrh-qxmc-x8c8", "modified": "2024-04-03T21:53:19Z", "published": "2024-04-03T21:31:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3178" }, { "type": "WEB", "url": "https://github.com/concretecms/concretecms/pull/11988" }, { "type": "WEB", "url": "https://github.com/concretecms/concretecms/pull/11989" }, { "type": "WEB", "url": "https://github.com/concretecms/concretecms/commit/822e689cefe1eb876e9de31dad9ce660f3b5c295" }, { "type": "WEB", "url": "https://github.com/concretecms/concretecms/commit/f2ea49b3cdbac3cbfdf5d3c862de7b7097bbe904" }, { "type": "WEB", "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA." }, { "type": "WEB", "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA." }, { "type": "PACKAGE", "url": "https://github.com/concretecms/concretecms" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ], "summary": "Concrete CMS\u00a0Cross-site Scripting (XSS) in the Advanced File Search Filter" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…