Description
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Remediation
References
Related Vulnerabilities
IBM RTC Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1734)
Oracle Application Server Other Vulnerability (CVE-2005-1383)
WordPress Plugin Mailing List 'wpabspath' Parameter Remote File Include (1.3.3)
WordPress Plugin Theme Check Cross-Site Request Forgery (20190208.1)