First published: Thu Apr 13 2017(Updated: )
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/concrete5/concrete5 | <=8.1.0 | |
Concrete5 | =8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7725 is considered to be of medium severity due to the potential for remote header injection attacks.
To fix CVE-2017-7725, ensure that a canonical URL is defined during the installation of concrete5 in the Advanced Options settings.
CVE-2017-7725 affects Concrete5 version 8.1.0 and earlier.
CVE-2017-7725 allows remote attackers to exploit header injection vulnerabilities via manipulated Host headers.
To verify if your Concrete5 installation is vulnerable, check if the system is running version 8.1.0 or earlier and whether a canonical URL has been set.