Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

concrete5 CMS 5.7.x < 5.7.3.8 Multiple Vulnerabilities

High

Synopsis

The remote web server hosts an application that is vulnerable to multiple attack vectors.

Description

The version of concrete5 installed on the remote host is version 5.7.x, earlier than 5.7.3.8 and is affected by multiple vulnerabilities :

- A flaw exists that allows a stored cross-site scripting (XSS) attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/registration/open.php' script does not validate input to the 'register_notification_email', 'uEmail', and 'uDefaultLanguage' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140650) - A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/registration/profiles.php' script does not validate input to the gravatar_max_level' and 'gravatar_image_set' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140651) - A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/users/points/actions.php' script does not validate input to the 'upaHandle' and 'upaName' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140652) - A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/elements/files/add_to_sets.php' script does not validate input to the 'fsNewText' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140653) - A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/extend/connect.php' script does not validate input to the 'csToken' and 'csURLToken' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140654) - A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/multilingual/translate_interface.php' script does not validate input to the 'msgstr' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (OSVDB 140655) - A local file inclusion (LFI) flaw exists due to the 'Application::dispatch()' method using input when crafting the path for a file to include. With a specially crafted request, a remote attacker can include arbitrary files from the targeted host. This may allow disclosing file contents or executing files like PHP scripts. Such attacks are limited due to the script only calling files already on the target host. (OSVDB 140656) - A flaw exists as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to delete files from the file manager, change public registration, public profile, and authentication type settings, add, edit, or delete community points, save arbitrary translation site settings, add or remove groups, connect to a community market place, or potentially have other impacts. (OSVDB 140688)

Solution

Upgrade to concrete5 version 5.7.3.8 or later.