logo

CVE-2021-22970 concrete5/core

Package

Manager: composer
Name: concrete5/core
Vulnerable Version: >=0 <8.5.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L

EPSS: 0.00386 pctl0.58979

Details

Server-Side Request Forgery in Concrete CMS Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable to SSRF attacks on the private LAN to servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb.

Metadata

Created: 2021-11-23T18:18:43Z
Modified: 2021-11-22T18:24:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-gqpw-9q54-9x28/GHSA-gqpw-9q54-9x28.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-gqpw-9q54-9x28
Finding: F100
Auto approve: 1