{ "id": "CVE-2022-30117", "sourceIdentifier": "support@hackerone.com", "published": "2022-06-24T15:15:10.863", "lastModified": "2024-11-21T07:02:11.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concrete doesn\u2019t allow traversal and by changing isFullChunkFilePresent to have an early false return when input doesn't match expectations.Concrete CMS Security team ranked this 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Credit to Siebene for reporting." }, { "lang": "es", "value": "Concrete versiones 8.5.7 y anteriores, as\u00ed como Concrete versiones 9.0 hasta 9.0.2, permiten un salto en el archivo /index.php/ccm/system/file/upload, lo que podr\u00eda resultar en una explotaci\u00f3n de eliminaci\u00f3n de archivos arbitrarios. Esto fue mitigado al sanear /index.php/ccm/system/file/upload para asegurar que Concrete no permita el salto y cambiando isFullChunkFilePresent para que tenga un retorno falso temprano cuando la entrada no coincida con las expectativas. El equipo de seguridad de Concrete CMS clasific\u00f3 esto 5.8 con vector CVSS v3.1 AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Cr\u00e9dito a Siebene por reportar" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "support@hackerone.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.5.8", "matchCriteriaId": "D821B974-A48F-4925-B849-55AC51A0BE0A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.0.0", "versionEndExcluding": "9.1.0", "matchCriteriaId": "E6E5829D-AFD1-4C1B-9E53-400D09956577" } ] } ] } ], "references": [ { "url": "https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes", "source": "support@hackerone.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes", "source": "support@hackerone.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://hackerone.com/reports/1482280", "source": "support@hackerone.com", "tags": [ "Permissions Required", "Third Party Advisory" ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://hackerone.com/reports/1482280", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ] } ] }