Show filters
182 Total Results
Displaying 91-100 of 182
Sort by:
Attacker Value
Unknown
CVE-2021-22966
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved. Concrete CMS Security team CVSS scoring: 7.1 AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HCredit for discovery: "Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )"This fix is also in Concrete version 9.0.0
0
Attacker Value
Unknown
CVE-2021-22951
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: "Solar Security Research Team"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.0
0
Attacker Value
Unknown
CVE-2021-22958
Disclosure Date: October 07, 2021 (last updated February 23, 2025)
A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.CVSSv2.0 AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
0
Attacker Value
Unknown
CVE-2021-41463
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in toos/permissions/dialogs/access/entity/types/group_combination.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the cID parameter.
0
Attacker Value
Unknown
CVE-2021-41461
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the mode parameter.
0
Attacker Value
Unknown
CVE-2021-41462
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the ctID parameter.
0
Attacker Value
Unknown
CVE-2021-41464
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.
0
Attacker Value
Unknown
CVE-2021-41465
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_theme.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.
0
Attacker Value
Unknown
CVE-2021-40108
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint.
0
Attacker Value
Unknown
CVE-2021-40109
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from the redirected-to server. Files of disallowed types can be uploaded.
0