Lucene search

K
cvelistConcreteCMSCVELIST:CVE-2024-4350
HistoryAug 09, 2024 - 12:37 a.m.

CVE-2024-4350 Stored XSS in RSS Displayer

2024-08-0900:37:44
CWE-20
ConcreteCMS
www.cve.org
3
concrete cms
stored xss
rss displayer
vulnerable
insufficient input validation
cvss v3.1
cvss v4.0
security team

CVSS4

2.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

EPSS

0.001

Percentile

21.0%

Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium forΒ reporting.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Concrete CMS",
    "repo": "https://github.com/concretecms/concretecms",
    "vendor": "Concrete CMS",
    "versions": [
      {
        "lessThan": "9.3.3",
        "status": "affected",
        "version": "9.0.0",
        "versionType": "git"
      },
      {
        "lessThan": "8.5.18",
        "status": "affected",
        "version": "5.0.0",
        "versionType": "git"
      }
    ]
  }
]

CVSS4

2.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

EPSS

0.001

Percentile

21.0%

Related for CVELIST:CVE-2024-4350