Files
CVEs-PoC/2017/CVE-2017-7725.md
T
2024-06-18 02:51:15 +02:00

20 lines
1.0 KiB
Markdown

### [CVE-2017-7725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7725)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
### POC
#### Reference
- http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt
- https://packetstormsecurity.com/files/142145/concrete5-8.1.0-Host-Header-Injection.html
- https://www.exploit-db.com/exploits/41885/
#### Github
No PoCs found on GitHub currently.