concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/41885/ | exploit vdb entry third party advisory |
http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt | third party advisory exploit |
https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/97649 | vdb entry third party advisory |
https://hackerone.com/reports/148300 | exploit vdb entry third party advisory |