Arbitrary Code Execution via Insufficient Filtration in concrete5 <= 5.6.3.4
CVE-2017-6908 · MEDIUM Severity
AV:N/AC:M/AU:N/C:N/I:P/A:N
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Learn more about our Web App Pen Testing.