icon

We found results for “

CVE-2021-36766

Good to know:

icon

Date: July 27, 2021

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Deserialization of Untrusted Data

CWE-502

Top Fix

icon

Upgrade Version

Upgrade to version concrete5/concrete5 - dev-marketplace-migration;concrete5/concrete5 - dev-feature/usable-welcome-page;concrete5/concrete5 - 9.0.0RC1;concrete5/concrete5 - 8.5.6RC1;concrete5/concrete5 - dev-allow-install-php-8.2;concrete5/concrete5 - dev-feature/composer-php8-support;concrete5/concrete5 - dev-fix-redis-config;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/postcss-and-vue-loader-8.4.31;concrete5/concrete5 - dev-fix-h1-1102211;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/json5-1.0.2;concrete5/concrete5 - dev-backport-9975;concrete5/concrete5 - 8.5.0RC2;concrete5/concrete5 - dev-dependabot/npm_and_yarn/build/async-2.6.4;concrete5/concrete5 - 8.5.x-dev;concrete5/core - 8.5.6RC1;concrete5/core - 9.0.0RC1;concrete5/core - 8.4.2;concrete5/core - 8.5.2;concrete5/core - 8.5.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): SINGLE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us