CVE-2024-1246: Improper Input Validation
Concrete CMS in version 9 before 9.2.5 is vulnerable to reflected XSS via the Image URL Import Feature due to insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user’s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. This does not affect Concrete versions prior to version 9.
References
- documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes
- github.com/advisories/GHSA-9v3w-cj7m-qh5g
- github.com/concretecms/concretecms/commit/59a07472ad6349a2c5fb455837a54ed1fe3f6953
- nvd.nist.gov/vuln/detail/CVE-2024-1246
- www.concretecms.org/about/project-news/security/2024-02-04-security-advisory
Detect and mitigate CVE-2024-1246 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →