Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tY3hyLWZ4NWYtOTZxcc0Xjw
Server-Side Request Forgery in Concrete CMS
Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.
Permalink: https://github.com/advisories/GHSA-mcxr-fx5f-96qqJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tY3hyLWZ4NWYtOTZxcc0Xjw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: almost 2 years ago
Identifiers: GHSA-mcxr-fx5f-96qq, CVE-2021-22969
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-22969
- https://hackerone.com/reports/1369312
- https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes
- https://github.com/advisories/GHSA-mcxr-fx5f-96qq
Affected Packages
packagist:concrete5/core
Dependent packages: 37Dependent repositories: 56
Downloads: 129,586 total
Affected Version Ranges: < 8.5.7
Fixed in: 8.5.7
All affected versions: 8.2.0, 8.2.1, 8.3.0, 8.3.1, 8.3.2, 8.4.0, 8.4.1, 8.4.2, 8.4.3, 8.4.4, 8.4.5, 8.5.0, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.6
All unaffected versions: 8.5.7, 8.5.8, 8.5.9, 8.5.10, 8.5.11, 8.5.12, 8.5.13, 8.5.14, 8.5.15, 8.5.16, 8.5.17, 8.5.18, 8.5.19, 9.0.0, 9.0.1, 9.0.2, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.2.7, 9.2.8, 9.2.9, 9.3.0, 9.3.1, 9.3.2, 9.3.3, 9.3.4, 9.3.5, 9.3.6