First published: Wed Mar 15 2017(Updated: )
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (disable_choose) passed to the "concrete5-legacy-master/web/concrete/tools/files/search_dialog.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concrete5 Concrete5 | <=5.6.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.