First published: Fri Nov 19 2021(Updated: )
Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Concretecms Concrete Cms | <=8.5.6 | |
Concretecms Concrete Cms | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-22970.
CVE-2021-22970 has a severity rating of 7.5 (high).
Concrete CMS versions 8.5.6 and below, as well as version 9.0.0, are affected by CVE-2021-22970.
CVE-2021-22970 allows for SSRF attacks on private LAN servers, potentially enabling an attacker to read files from the local LAN and exploit local network apps.
Yes, here are some references for more information on CVE-2021-22970: - https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes - https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes - https://hackerone.com/reports/1364797