Vulnerability Description
An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Concretecms | Concrete Cms | <= 8.5.5 |
Related Weaknesses (CWE)
References
- https://documentation.concretecms.org/developers/introduction/version-history/85Release NotesVendor Advisory
- https://hackerone.com/reports/921288Permissions RequiredThird Party Advisory
- https://documentation.concretecms.org/developers/introduction/version-history/85Release NotesVendor Advisory
- https://hackerone.com/reports/921288Permissions RequiredThird Party Advisory
FAQ
What is CVE-2021-40102?
CVE-2021-40102 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method).
How severe is CVE-2021-40102?
CVE-2021-40102 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-40102?
Check the references section above for vendor advisories and patch information. Affected products include: Concretecms Concrete Cms.