concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a “canonical” URL on installation of concrete5 using the “Advanced Options” settings. Remote attackers can make a GET request with any domain name in the Host header. This is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
CPE | Name | Operator | Version |
---|---|---|---|
concrete5/concrete5 | eq | 8.0.2 | |
concrete5/concrete5 | eq | 8.0.3 | |
concrete5/concrete5 | eq | 8.1.0 | |
concrete5/concrete5 | eq | 8.0 | |
concrete5/concrete5 | eq | 8.0.1 |
hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt
hackerone.com/reports/148300
nvd.nist.gov/vuln/detail/CVE-2017-7725
packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html
web.archive.org/web/20210124030008/https://www.securityfocus.com/bid/97649
www.exploit-db.com/exploits/41885