CVE-2021-22951 – concrete5/core
Package
Manager: composer
Name: concrete5/core
Vulnerable Version: >=0 <8.5.7
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00314 pctl0.53959
Details
Password exposure in concrete5/core Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.
Metadata
Created: 2021-11-23T18:18:16Z
Modified: 2021-11-22T18:22:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-rhf5-f553-xg82/GHSA-rhf5-f553-xg82.json
CWE IDs: ["CWE-200", "CWE-639"]
Alternative ID: GHSA-rhf5-f553-xg82
Finding: F039
Auto approve: 1