CVE-2024-8291

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)

Published: Sep 25, 2024 / Updated: 56d ago

010
CVSS 2.1EPSS 0.05%Low
CVE info copied to clipboard

Summary

Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type.

Impact

This vulnerability allows a rogue admin to inject malicious code into the Thumbnails/Add-Type feature of the Image Editor Background Color. The impact is limited, as it requires high privileges (admin access) and has low confidentiality impact with no integrity or availability impact. The CVSS v4 score is 2.1 (Low severity), and the CVSS v3.1 score is 4.8.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed in versions after 9.3.3 and 8.5.19.

Mitigation

Update Concrete CMS to the latest version (after 9.3.3 for the 9.x branch, or after 8.5.19 for the 8.x branch). Additionally, implement strict access controls and monitor admin activities, especially those related to the Image Editor and Thumbnail functionalities.

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-8291. See article

Sep 12, 2024 at 6:58 PM / Installatron Update Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Sep 12, 2024 at 6:59 PM
CVE Assignment

NVD published the first details for CVE-2024-8291

Sep 25, 2024 at 1:15 AM
CVSS

A CVSS base score of 2.1 has been assigned.

Sep 25, 2024 at 1:21 AM / nvd
Vendor Advisory

GitHub Advisories released a security advisory.

Sep 25, 2024 at 3:30 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.3%)

Sep 25, 2024 at 6:56 PM
CVSS

A CVSS base score of 2.1 has been assigned.

Sep 26, 2024 at 1:37 PM / nvd
CVSS

A CVSS base score of 4.8 has been assigned.

Sep 30, 2024 at 4:00 PM / nvd
Static CVE Timeline Graph

Affected Systems

Concretecms/concrete_cms
+null more

Patches

Github Advisory
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

Vendor Advisory

[GHSA-q7qr-22qw-pqgx] Cross site scripting in Concrete CMS
GitHub Security Advisory: GHSA-q7qr-22qw-pqgx Release Date: 2024-09-25 Update Date: 2024-09-25 Severity: Low CVE-2024-8291 Package Information Package: concrete5/concrete5 Affected Versions: >= 9.0.0, Patched Versions: 9.3.4 Description Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. References https://nvd.nist.gov/vuln/detail/CVE-2024-8291 concretecms/concretecms#12183 concretecms/concretecms@dbce253 https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes https://documentation.concretecms.org/developers/introduction/version-history/8519-release-notes concretecms/concretecms@d97b43b

News

[GHSA-q7qr-22qw-pqgx] Cross site scripting in Concrete CMS
GitHub Security Advisory: GHSA-q7qr-22qw-pqgx Release Date: 2024-09-25 Update Date: 2024-09-25 Severity: Low CVE-2024-8291 Package Information Package: concrete5/concrete5 Affected Versions: >= 9.0.0, Patched Versions: 9.3.4 Description Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. References https://nvd.nist.gov/vuln/detail/CVE-2024-8291 concretecms/concretecms#12183 concretecms/concretecms@dbce253 https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes https://documentation.concretecms.org/developers/introduction/version-history/8519-release-notes concretecms/concretecms@d97b43b
CVE-2024-8291
Medium Severity Description Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, Alexey Solovyev for reporting. Read more at https://www.tenable.com/cve/CVE-2024-8291
NA - CVE-2024-8291 - Concrete CMS versions 9.0.0 to 9.3.3 and below...
Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete...
CVE-2024-8291 | Concrete CMS up to 8.5.18/9.3.3 Image Editor Background Color cross site scripting
A vulnerability has been found in Concrete CMS up to 8.5.18/9.3.3 and classified as problematic . Affected by this vulnerability is an unknown functionality of the component Image Editor Background Color . The manipulation leads to cross site scripting. This vulnerability is known as CVE-2024-8291 . The attack can be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2024-8291
Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color. A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, Alexey Solovyev for...
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI