RSS   Podatności dla 'Concrete5'   RSS

2021-10-07
 
CVE-2021-22958

CWE-918
 

 
A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.CVSSv2.0 AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

 
2021-01-08
 
CVE-2021-3111

CWE-79
 

 
The Express Entries Dashboard in Concrete5 8.5.4 allows stored XSS via the name field of a new data object at an index.php/dashboard/express/entries/view/ URI.

 
2020-09-04
 
CVE-2020-24986

CWE-434
 

 
Concrete5 up to and including 8.5.2 allows Unrestricted Upload of File with Dangerous Type such as a .php file via File Manager. It is possible to modify site configuration to upload the PHP file and execute arbitrary commands.

 
2020-07-28
 
CVE-2020-11476

CWE-434
 

 
Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.

 
2019-06-17
 
CVE-2018-19146

CWE-79
 

 
Concrete5 8.4.3 has XSS because config/concrete.php allows uploads (by administrators) of SVG files that may contain HTML data with a SCRIPT element.

 
2018-07-09
 
CVE-2018-13790

CWE-918
 

 
A Server Side Request Forgery (SSRF) vulnerability in tools/files/importers/remote.php in concrete5 8.2.0 can lead to attacks on the local network and mapping of the internal network, because of URL functionality on the File Manager page.

 
2018-02-26
 
CVE-2017-18195

CWE-20
 

 
An issue was discovered in tools/conversations/view_ajax.php in Concrete5 before 8.3.0. An unauthenticated user can enumerate comments from all blog posts by POSTing requests to /index.php/tools/required/conversations/view_ajax with incremental 'cnvID' integers.

 
2017-09-07
 
CVE-2015-4724

 

 
SQL injection vulnerability in Concrete5 5.7.3.1.

 
 
CVE-2015-4721

 

 
Multiple cross-site scripting (XSS) vulnerabilities in Concrete5 5.7.3.1.

 
2017-04-24
 
CVE-2017-8082

 

 
concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators.

 


Copyright 2024, cxsecurity.com

 

Back to Top