CVE-2017-6905
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (disable_choose) passed to the "concrete5-legacy-master/web/concrete/tools/files/search_dialog.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Se ha descubierto un problema en concrete5 <= 5.6.3.4. La vulnerabilidad existe debido a filtración insuficiente de datos suministrados por el usuario (disable_choose) pasados a la URL "concrete5-legacy-master/web/concrete/tools/files/search_dialog.php". Un atacante podría ejecutar código HTML y secuencia de comandos arbitrario en un buscador en el contexto del sitio web vulnerable.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-14 CVE Reserved
- 2017-03-15 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/96891 | Third Party Advisory | |
https://github.com/concrete5/concrete5-legacy/issues/1947 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Concrete5 Search vendor "Concrete5" | Concrete5 Search vendor "Concrete5" for product "Concrete5" | <= 5.6.3.4 Search vendor "Concrete5" for product "Concrete5" and version " <= 5.6.3.4" | - |
Affected
|