### [CVE-2017-7725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7725) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector. ### POC #### Reference - http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt - https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html - https://www.exploit-db.com/exploits/41885/ #### Github No PoCs found on GitHub currently.