We found results for “”
CVE-2021-22953
Good to know:
Date: September 23, 2021
A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to clone topics which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security Research Team"
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Cross-Site Request Forgery (CSRF)
CWE-352Top Fix
Upgrade Version
Upgrade to version concrete5/concrete5 - 8.5.x-dev;concrete5/concrete5 - dev-feature/composer-php8-support;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/postcss-and-vue-loader-8.4.31;concrete5/concrete5 - dev-update-deps-85;concrete5/concrete5 - dev-feature/usable-welcome-page;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/json5-1.0.2;concrete5/concrete5 - dev-fix-redis-config;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/async-2.6.4;concrete5/concrete5 - 8.5.0RC2;concrete5/concrete5 - dev-backport-9975;concrete5/concrete5 - dev-feature-multisite-licenses;concrete5/concrete5 - dev-marketplace-migration;concrete5/concrete5 - dev-security-fixes-110623;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/word-wrap-1.2.4;concrete5/concrete5 - 8.5.7;concrete5/concrete5 - 8.5.6;concrete5/concrete5 - 9.0.0RC1;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/lodash.template-and-download--removed;concrete5/concrete5 - dev-allow-install-php-8.2;concrete5/core - 8.5.1;concrete5/core - 8.5.2;concrete5/core - 8.4.2;concrete5/core - 9.0.0RC1;concrete5/core - 8.5.6RC1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | LOW |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | MEDIUM |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | PARTIAL |
| Additional information: |
Vulnerabilities
Projects
Contact Us


