logo

CVE-2021-22969 concrete5/core

Package

Manager: composer
Name: concrete5/core
Vulnerable Version: >=0 <8.5.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L

EPSS: 0.00268 pctl0.5004

Details

Server-Side Request Forgery in Concrete CMS Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.

Metadata

Created: 2021-11-23T18:18:35Z
Modified: 2021-11-22T18:30:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-mcxr-fx5f-96qq/GHSA-mcxr-fx5f-96qq.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-mcxr-fx5f-96qq
Finding: F100
Auto approve: 1