In this article, the author explores ways to bypass protection methods using the PHP Stream Wrappers, which are responsible for handling protocol related tasks like downloading data from a web or ftp server and exposing it in a way in that it can be handled with PHP's stream related functions.
eb1b419125c1b9aa31bd933a42cb8186ad467dc3e63433095d4ed7b2fb2a7128
Concrete version 5.7.3.1 suffers from multiple cross site scripting vulnerabilities.
bc47fcda67ebda1d45c2ef30d588e722aa0845a565cf2e28ac9f78fe588936d2