SILENT KILLERPanel

Current Path: > > > var > softaculous > conc85


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: ///var/softaculous/conc85

NameTypeSizeLast ModifiedActions
images Directory - -
php53 Directory - -
php56 Directory - -
php71 Directory - -
php81 Directory - -
php82 Directory - -
Notes.txt File 2518 bytes November 04 2022 10:36:22.
_app.php File 459 bytes December 23 2021 11:54:36.
app.php File 19 bytes December 23 2021 11:54:36.
changelog.txt File 4500 bytes April 02 2025 10:55:04.
conc85.sql File 388562 bytes April 02 2025 10:55:04.
conc85.zip File 48873794 bytes April 02 2025 10:55:04.
concrete.php File 493 bytes April 02 2025 10:55:04.
data.zip File 9769907 bytes April 02 2025 10:55:04.
database.php File 419 bytes December 23 2021 11:54:36.
edit.php File 5214 bytes April 02 2025 11:17:02.
edit.xml File 433 bytes December 23 2021 11:54:36.
fileindex.php File 98 bytes December 23 2021 11:54:36.
gen_app.php File 373 bytes December 23 2021 11:54:36.
import.php File 5263 bytes April 02 2025 11:17:02.
info.xml File 3701 bytes April 02 2025 10:55:04.
install.js File 921 bytes December 23 2021 11:54:36.
install.php File 8809 bytes April 02 2025 11:17:02.
install.xml File 841 bytes December 23 2021 11:54:36.
md5 File 1537 bytes April 02 2025 11:17:00.
sample_concrete.php File 569 bytes April 02 2025 10:55:04.
sample_data.sql File 681800 bytes April 02 2025 10:55:04.
site.php File 429 bytes December 23 2021 11:54:36.
update_pass.php File 7137 bytes May 26 2023 07:54:42.
upgrade.php File 5875 bytes April 02 2025 11:17:02.
upgrade.xml File 1238 bytes December 23 2021 11:54:36.

Reading File: ///var/softaculous/conc85/changelog.txt

8.5.20 Release Notes

New Features

    Significant improvements to content import/export: added support for multilingual page mapping, additional page paths, external links and more (thanks mlocati)
    Disabled searching marketplace since marketplace supports 9+ (thanks mlocati)

Bug Fixes

    Fix exporting area layout column when area is null (thanks mlocati)
    Fixed some small errors when importing stack content (thanks mlocati)
    Fix exporting page fields when page can't be found (thanks mlocati)

Security Updates

    Safer storage of API keys on Windows (not necessary for Concrete CMS v9+, see more information here https://github.com/concretecms/concretecms/pull/11859) (thanks mlocati)
    Fixed unsanitized address custom attribute when rendering addresses unattached to a particular country.

Developer Updates

    Page::getByPath can now except a as well as a site tree and return all pages in all multilingual site trees therein (thanks mlocati)
    When importing pages at paths that don’t exist, we now throw a specific exception that can be handled differently in different cases (thanks mlocati)
	
8.5.19 Release Notes

Security Updates

    Fixed CVE-2024-8291 Stored XSS in Image Editor Background Color by sanitizing output of "Save Background Image Colour" in file thumbnail dashboard single page with commit dbce253166f6b10ff3e0c09e50fd395370b8b065 for version 8 and commit 12183 for version 9. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Prior to the fix a rogue admin could add malicious code to the Thumbnails/Add Type. Thanks Alexey Solovyev for reporting HackerOne 921527.

    Fixed CVE-2024-7398 Stored XSS Vulnerability in Calendar Event Addition Feature with commit 7c8ed0d1d9db0d7f6df7fa066e0858ea618451a5 for version 8 and commits 12183 and 12184 for version 9. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 1.8 with vector VSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N Prior to the fix, the calendar event name was not sanitized on output. Users or groups with permission to create event calendars could embed scripts and users or groups with permission to modify event calendars could execute scripts. Thank you Yusuke Uchida for reporting HackerOne 2400810.

    Fixed CVE-2024-8661 Stored XSS in the "Next&Previous Nav" block with commit 12204 for version 9 and with commit ce5ee2ab83fe8de6fa012dd51c5a1dde05cb0dc4 for version 8. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Prior to the fix, a rogue admin could add a malicious payload. Since the "Next&Previous Nav" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users. Thanks Chu Quoc Khanh for reporting HackerOne 2610205
	
8.5.18 Release Notes

Bug Fixes

    Fixed bug where boolean page attributes that are checked by default show up as checked even if they have previously been saved unchecked (thanks hissy)
    Fixed some issues when attempting to use Redis to store session under certain conditions (thanks mlocati)

Security Updates

    Fixed CVE-2024-4350 Stored XSS in RSS Displayer with commit 12166 for version 9 and with commit c08d9671cec4e7afdabb547339c4bc0bed8eab06 for version 8. Prior to the fix a rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks m3dium for reporting HackerOne 2479824

    Fixed CVE-2024-7394 Stored XSS in getAttributeSetName() by sanitizing Board instance names on output with commit 12166 for version 9 and commit c08d9671cec4e7afdabb547339c4bc0bed8eab06 for version 8. Prior to the fix, a rogue administrator could inject malicious code. The Concrete CMS team ranked this a CVSS v3.1 rank of 2 with vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N and a CVSS v4.0 rank of 1.8 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks m3dium for reporting HackerOne 2463288

    Show a more generic error message in RSS Displayer block if curl is unable to load posts. Thanks m3dium for recommending this in HackerOne 2479824

SILENT KILLER Tool