First published: Wed Mar 15 2017(Updated: )
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (disable_choose) passed to the "concrete5-legacy-master/web/concrete/tools/files/search_dialog.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concrete5 | <=5.6.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6905 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2017-6905, you should upgrade Concrete5 to version 5.6.4 or later, where the vulnerability has been patched.
CVE-2017-6905 affects Concrete5 versions up to and including 5.6.3.4.
CVE-2017-6905 can be exploited by attackers to execute arbitrary HTML and script code in the context of the user's browser.
Yes, CVE-2017-6905 is due to insufficient filtration of user-supplied data, highlighting a major flaw in input validation.