CVE-2023-44763

Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
Configurations

Configuration 1 (hide)

cpe:2.3:a:concretecms:concrete_cms:9.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 08:26

Type Values Removed Values Added
References () https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail - Exploit, Third Party Advisory () https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail - Exploit, Third Party Advisory
References () https://web.archive.org/web/20231026034159/https://documentation.concretecms.org/user-guide/editors-reference/dashboard/system-and-maintenance/files/allowed-file-types - () https://web.archive.org/web/20231026034159/https://documentation.concretecms.org/user-guide/editors-reference/dashboard/system-and-maintenance/files/allowed-file-types -
References () https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-25-concrete-cms-rejects-cve-2023-44763 - () https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-25-concrete-cms-rejects-cve-2023-44763 -

07 Nov 2023, 04:21

Type Values Removed Values Added
Summary ** DISPUTED ** Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration. Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.

26 Oct 2023, 04:15

Type Values Removed Values Added
References
  • (MISC) https://web.archive.org/web/20231026034159/https://documentation.concretecms.org/user-guide/editors-reference/dashboard/system-and-maintenance/files/allowed-file-types -
  • (MISC) https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-25-concrete-cms-rejects-cve-2023-44763 -
Summary Concrete CMS v9.2.1 is affected by Arbitrary File Upload vulnerability via the Thumbnail" file upload, which allows Cross-Site Scripting (XSS). ** DISPUTED ** Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.

13 Oct 2023, 16:15

Type Values Removed Values Added
CWE CWE-434
CPE cpe:2.3:a:concretecms:concrete_cms:9.2.1:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References (MISC) https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail - (MISC) https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail - Exploit, Third Party Advisory
First Time Concretecms concrete Cms
Concretecms

10 Oct 2023, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-10 12:15

Updated : 2024-11-21 08:26


NVD link : CVE-2023-44763

Mitre link : CVE-2023-44763

CVE.ORG link : CVE-2023-44763


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type