Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2022-43693 CVE-2022-43692 CVE-2022-43694 CVE-2022-43967 CVE-2022-43968 CVE-2022-43686 CVE-2022-43691 CVE-2022-43687 CVE-2022-43695 CVE-2022-43690 CVE-2022-43688 CVE-2022-43689 |
CWE-ID | CWE-352 CWE-79 CWE-20 CWE-200 CWE-384 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
concrete5 Web applications / CMS |
Vendor | PortlandLabs |
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU68874
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43693
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68875
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43692
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in dashboard search pages. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68877
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43694
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Image Manipulation Library. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68878
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43967
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in multilingual dashboard report. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68879
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43968
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the icons dashboard page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68880
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-43686
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the "forever" cookie. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68881
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-43691
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68882
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-43687
CWE-ID:
CWE-384 - Session Fixation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the session fixation issue. A remote attacker can gain access to the session.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68883
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43695
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in entity association dashboard page. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68884
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-43690
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68885
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-43688
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within the Microsoft tile icon. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68888
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-43689
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsconcrete5: 8.5.0 - 9.1.2
http://github.com/concrete5/concrete5/releases/tag/9.1.3
http://github.com/concretecms/concretecms/releases/tag/8.5.10
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?