CVE-2022-21829 – concrete5/core
Package
Manager: composer
Name: concrete5/core
Vulnerable Version: >=9.0.0 <9.1.0 || >=0 <8.5.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00884 pctl0.74544
Details
Code injection in concrete CMS Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.
Metadata
Created: 2022-06-25T00:00:53Z
Modified: 2022-07-06T16:49:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-6xc4-7fmm-65q2/GHSA-6xc4-7fmm-65q2.json
CWE IDs: ["CWE-319", "CWE-74"]
Alternative ID: GHSA-6xc4-7fmm-65q2
Finding: F184
Auto approve: 1