Vulnerability Description
Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Concretecms | Concrete Cms | < 8.5.8 |
Related Weaknesses (CWE)
References
- https://documentation.concretecms.org/developers/introduction/version-history/85Release NotesVendor Advisory
- https://documentation.concretecms.org/developers/introduction/version-history/91
- https://hackerone.com/reports/1482520%2C
- https://documentation.concretecms.org/developers/introduction/version-history/85Release NotesVendor Advisory
- https://documentation.concretecms.org/developers/introduction/version-history/91
- https://hackerone.com/reports/1482520%2C
FAQ
What is CVE-2022-21829?
CVE-2022-21829 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ in...
How severe is CVE-2022-21829?
CVE-2022-21829 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-21829?
Check the references section above for vendor advisories and patch information. Affected products include: Concretecms Concrete Cms.