7.5
CWE
918
Advisory Published
Updated

CVE-2021-22970: SSRF

First published: Fri Nov 19 2021(Updated: )

Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal

Credit: support@hackerone.com

Affected SoftwareAffected VersionHow to fix
Concretecms Concrete Cms<=8.5.6
Concretecms Concrete Cms=9.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2021-22970.

  • What is the severity rating of CVE-2021-22970?

    CVE-2021-22970 has a severity rating of 7.5 (high).

  • Which versions of Concrete CMS are affected by CVE-2021-22970?

    Concrete CMS versions 8.5.6 and below, as well as version 9.0.0, are affected by CVE-2021-22970.

  • What is the impact of CVE-2021-22970?

    CVE-2021-22970 allows for SSRF attacks on private LAN servers, potentially enabling an attacker to read files from the local LAN and exploit local network apps.

  • Are there any references or resources for CVE-2021-22970?

    Yes, here are some references for more information on CVE-2021-22970: - https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes - https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes - https://hackerone.com/reports/1364797

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203