CVE-2021-22970 – concrete5/core
Package
Manager: composer
Name: concrete5/core
Vulnerable Version: >=0 <8.5.7
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
EPSS: 0.00386 pctl0.58979
Details
Server-Side Request Forgery in Concrete CMS Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable to SSRF attacks on the private LAN to servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb.
Metadata
Created: 2021-11-23T18:18:43Z
Modified: 2021-11-22T18:24:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-gqpw-9q54-9x28/GHSA-gqpw-9q54-9x28.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-gqpw-9q54-9x28
Finding: F100
Auto approve: 1