Page 13 of 81 results (0.005 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method). Se ha detectado un problema en Concrete CMS versiones hasta 8.5.5. Puede producirse una eliminación arbitraria de archivos por medio de una deserialización de PHAR en la función is_dir (inyección de objetos PHP asociada al método mágico __wakeup). • https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes https://hackerone.com/reports/921288 • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to clone topics which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security Research Team" Una vulnerabilidad de tipo CSRF en Concrete CMS versiones 8.5.5 e inferiores, permite a un atacante clonar temas, lo que puede conllevar a molestias en la Interfaz de Usuario y el agotamiento del espacio en disco. Crédito por la detección: "Solar Security Research Team" • https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes https://hackerone.com/reports/1102225 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Concrete CMS prior to 8.5.6 had a CSFR vulnerability allowing attachments to comments in the conversation section to be deleted.Credit for discovery: "Solar Security Research Team" Concrete CMS versiones anteriores a 8.5.6, presentaba una vulnerabilidad de tipo CSFR que permitía eliminar los archivos adjuntos a los comentarios en la sección de conversación. Crédito por la detección: "Solar Security Research Team" • https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes https://hackerone.com/reports/1102177 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security CMS Research Team" Una vulnerabilidad de tipo CSRF en Concrete CMS versión 8.5.5 y por debajo, permite a un atacante duplicar archivos lo que puede conllevar a molestias en la Interfaz de Usuario, y el agotamiento del espacio en disco. Crédito por la detección: "Solar Security CMS Research Team" • https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes https://hackerone.com/reports/1102225 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.2EPSS: 3%CPEs: 1EXPL: 2

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code. Concrete5 versiones hasta 8.5.5, deserializa Datos no Confiables. • http://packetstormsecurity.com/files/163564/Concrete5-8.5.5-Phar-Deserialization.html http://seclists.org/fulldisclosure/2021/Jul/36 https://hackerone.com/reports/1063039 • CWE-502: Deserialization of Untrusted Data •