First published: Mon Apr 24 2017(Updated: )
concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Concrete5 | =8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8082 has a high severity rating due to its ability to disable the entire concrete5 installation.
To fix CVE-2017-8082, upgrade your concrete5 installation to a version later than 8.1.0 that addresses the CSRF vulnerability.
CVE-2017-8082 allows remote attackers to execute actions that can disable your concrete5 site if an admin visits a malicious page.
CVE-2017-8082 specifically affects Concrete5 version 8.1.0.
Yes, CVE-2017-8082 requires user interaction, as it relies on tricking an admin into viewing a malicious page.