Vulnerability Details : CVE-2022-21829
Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.
Vulnerability category: Execute code
Products affected by CVE-2022-21829
- cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
- cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-21829
0.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-21829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-21829
-
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2022-21829
-
https://hackerone.com/reports/1482520,
Broken Link
-
https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes
8.5.8 Release Notes :: Concrete CMSRelease Notes;Vendor Advisory
-
https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes,
Page Not Found :: Concrete CMSBroken Link
Jump to