fkie_cve-2021-22970
Vulnerability from fkie_nvd
Published
2021-11-19 19:15
Modified
2024-11-21 05:51
Severity ?
Summary
Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes | Release Notes, Vendor Advisory | |
support@hackerone.com | https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes | Release Notes, Vendor Advisory | |
support@hackerone.com | https://hackerone.com/reports/1364797 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1364797 | Permissions Required |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
concretecms | concrete_cms | * | |
concretecms | concrete_cms | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F85DB455-2529-4BEF-BC5F-716FFA06A202", "versionEndIncluding": "8.5.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:concretecms:concrete_cms:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "81E8F7E8-4ADE-49D3-AFBE-67BD0E5F2C8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal" }, { "lang": "es", "value": "Concrete CMS (antes concrete5) versiones 8.5.6 y anteriores versi\u00f3n 9.0.0, permiten una importaci\u00f3n de IP locales causando que el sistema sea vulnerable a unos ataques de tipo SSRF en los servidores de la LAN privada mediante una lectura de archivos de la LAN local. Un atacante puede pivotar en la LAN privada y explotar la red local appsandb. El equipo de seguridad de Concrete CMS le ha dado una puntuaci\u00f3n CVSS de 3,5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N Concrete CMS mantiene la versi\u00f3n 8.5.x de Concrete hasta el 1 de mayo de 2022 para las correcciones de seguridad. Este CVE se comparte con HackerOne Reports https://hackerone.com/reports/1364797 y https://hackerone.com/reports/1360016Reporters: Adrian Tiron de FORTBRIDGE (https://www.fortbridge.co.uk/ ) y Bipul Jaiswal" } ], "id": "CVE-2021-22970", "lastModified": "2024-11-21T05:51:02.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-19T19:15:08.563", "references": [ { "source": "support@hackerone.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes" }, { "source": "support@hackerone.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes" }, { "source": "support@hackerone.com", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1364797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1364797" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…