Описание
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 did not use strict comparison for the legacy_salt so that limited authentication bypass could occur if using this functionality. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
Ссылки
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Vendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 8.5.10 (исключая)Версия от 9.0.0 (включая) до 9.1.2 (включая)
Одно из
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.006
Низкий
6.3 Medium
CVSS3
Дефекты
NVD-CWE-Other
CWE-287
Связанные уязвимости
CVSS3: 6.3
github
около 3 лет назад
Concrete CMS vulnerable to Improper Authentication
EPSS
Процентиль: 69%
0.006
Низкий
6.3 Medium
CVSS3
Дефекты
NVD-CWE-Other
CWE-287