concrete5 CMS 5.7.x < 5.7.3.8 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9926

Synopsis

The remote web server hosts an application that is vulnerable to multiple attack vectors.

Description

The version of concrete5 installed on the remote host is version 5.7.x, earlier than 5.7.3.8 and is affected by multiple vulnerabilities :

- A flaw exists that allows a stored cross-site scripting (XSS) attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/registration/open.php' script does not validate input to the 'register_notification_email', 'uEmail', and 'uDefaultLanguage' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/registration/profiles.php' script does not validate input to the gravatar_max_level' and 'gravatar_image_set' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/users/points/actions.php' script does not validate input to the 'upaHandle' and 'upaName' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/elements/files/add_to_sets.php' script does not validate input to the 'fsNewText' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/extend/connect.php' script does not validate input to the 'csToken' and 'csURLToken' POST parameters before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A flaw exists that allows a stored XSS attack. This flaw exists because the '/concrete/controllers/single_page/dashboard/system/multilingual/translate_interface.php' script does not validate input to the 'msgstr' POST parameter before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
- A local file inclusion (LFI) flaw exists due to the 'Application::dispatch()' method using input when crafting the path for a file to include. With a specially crafted request, a remote attacker can include arbitrary files from the targeted host. This may allow disclosing file contents or executing files like PHP scripts. Such attacks are limited due to the script only calling files already on the target host.
- A flaw exists as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to delete files from the file manager, change public registration, public profile, and authentication type settings, add, edit, or delete community points, save arbitrary translation site settings, add or remove groups, connect to a community market place, or potentially have other impacts.

Solution

Upgrade to concrete5 version 5.7.3.8 or later.

See Also

http://seclists.org/fulldisclosure/2016/Jun/76

Plugin Details

Severity: High

ID: 9926

Family: CGI

Published: 1/27/2017

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:concrete5:concrete5

Patch Publication Date: 12/9/2015

Vulnerability Publication Date: 6/26/2016