Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
References
Configurations
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail - Exploit, Third Party Advisory | |
References | () https://web.archive.org/web/20231026034159/https://documentation.concretecms.org/user-guide/editors-reference/dashboard/system-and-maintenance/files/allowed-file-types - | |
References | () https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-25-concrete-cms-rejects-cve-2023-44763 - |
21 Mar 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 12:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-44763
Mitre link : CVE-2023-44763
CVE.ORG link : CVE-2023-44763
JSON object : View
Products Affected
concretecms
- concrete_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type