---------------------------------------------------------------------------- Concrete5 <= 5.7.3.1 Multiple Reflected Cross-Site Scripting Vulnerabilities ---------------------------------------------------------------------------- [-] Software Link: https://www.concrete5.org/ [-] Affected Versions: Version 5.7.3.1 and probably other versions. [-] Vulnerabilities Description: 1) The vulnerable code is located in /concrete/views/panels/details/page/versions.php: 5. foreach($_REQUEST['cvID'] as $cvID) { 6. $tabs[] = array('view-version-' . $cvID, t('Version %s', $cvID), $checked); 7. $checked = false; 8. } 9. print $ih->tabs($tabs); 10. foreach($_REQUEST['cvID'] as $cvID) { ?> 11. 12.
User input passed through the "cvID" and "cID" request parameters is not properly sanitized before being used to generate HTML output at lines 6 and 13. This can be exploited to conduct reflected Cross-Site Scripting (XSS) attacks. 2) The vulnerable code is located in /concrete/src/Form/Service/Widget/UserSelector.php: 17. public function selectUser($fieldName, $uID = false, $javascriptFunc = 'ccm_triggerSelectUser') { 18. $selectedUID = 0; 19. if (isset($_REQUEST[$fieldName])) { 20. $selectedUID = $_REQUEST[$fieldName]; 21. } else if ($uID > 0) { 22. $selectedUID = $uID; 23. } 24. 25. $html = ''; 26. $html .= '