Server-Side Request Forgery in Concrete CMS
Moderate severity
GitHub Reviewed
Published
Nov 23, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Nov 19, 2021
Reviewed
Nov 22, 2021
Published to the GitHub Advisory Database
Nov 23, 2021
Last updated
Feb 1, 2023
Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.
References