First published: Fri Jun 24 2022(Updated: )
Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Concretecms Concrete Cms | <8.5.8 | |
Concretecms Concrete Cms | >=9.0.0<9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21829 is a vulnerability in Concrete CMS versions 9.0.0 through 9.0.2 and 8.5.7 and below that allows downloading zip files over HTTP and executing code from those zip files, potentially leading to remote code execution (RCE).
CVE-2022-21829 has a severity rating of 9.8 (Critical).
To fix CVE-2022-21829, update Concrete CMS to version 8.5.8 or above for versions 8.x and to version 9.1.0 or above for versions 9.x. Additionally, ensure that requests are made over HTTPS and not HTTP.
Yes, you can find reference links for CVE-2022-21829 at the following locations: [1] https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes [2] https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes [3] https://hackerone.com/reports/1482520
The CWE ID for CVE-2022-21829 is 319.