CVE-2022-30120

XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*

History

05 Jul 2022, 19:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
CWE CWE-79
CPE cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
First Time Concretecms concrete Cms
Concretecms
References (MISC) https://hackerone.com/reports/1363598 - (MISC) https://hackerone.com/reports/1363598 - Permissions Required, Third Party Advisory
References (MISC) https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes - (MISC) https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes - Release Notes, Vendor Advisory
References (MISC) https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes - (MISC) https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes - Release Notes, Vendor Advisory

24 Jun 2022, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-24 15:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-30120

Mitre link : CVE-2022-30120

CVE.ORG link : CVE-2022-30120


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')