CVE-2024-4350

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-4350
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4350.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-4350
Aliases
Published
2024-08-12T13:38:36Z
Modified
2025-01-17T23:48:14.103341Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)

References

Affected packages

Git / github.com/concretecms/concretecms

Affected ranges

Type
GIT
Repo
https://github.com/concretecms/concretecms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.7.0
5.7.0.1
5.7.0.3
5.7.0.4
5.7.1
5.7.2
5.7.2.1
5.7.3
5.7.3.1
5.7.4
5.7.4.1
5.7.4.2
5.7.5
5.7.5.1
5.7.5.10
5.7.5.11
5.7.5.12
5.7.5.2
5.7.5.3
5.7.5.4
5.7.5.5
5.7.5.6
5.7.5.7
5.7.5.8
5.7.5.9

8.*

8.0
8.0.1
8.0.2
8.0.3
8.1.0
8.2.0
8.2.0RC2
8.2.1
8.3.0
8.3.1
8.3.2
8.4.0
8.4.0RC3
8.4.0RC4
8.4.1
8.4.2
8.4.3
8.4.4
8.4.5
8.5.0
8.5.0RC1
8.5.0RC2
8.5.1
8.5.10
8.5.11
8.5.12
8.5.13
8.5.14
8.5.15
8.5.16
8.5.17
8.5.2
8.5.3
8.5.4
8.5.5
8.5.6
8.5.6RC1
8.5.7
8.5.8
8.5.9