First published: Wed Mar 15 2017(Updated: )
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concrete5 | <=5.6.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6908 has a moderate severity level, allowing potential cross-site scripting attacks.
To fix CVE-2017-6908, you should upgrade your Concrete5 installation to version 5.6.4 or later.
CVE-2017-6908 affects all versions of Concrete5 up to and including 5.6.3.4, allowing attackers to exploit unfiltered user-supplied data.
CVE-2017-6908 is associated with cross-site scripting (XSS) attacks due to insufficient data filtration.
The vulnerable component in CVE-2017-6908 is the selector_data.php tool in the Concrete5 legacy system.