CVE-2017-7725
moderate-risk
Published 2017-04-13
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
Do I need to act?
~
3.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
http://www.securityfocus.com/bid/97649
Third Party Advisory
http://www.securityfocus.com/bid/97649
42
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
14/34 · Moderate
Exposure
5/34 · Minimal