Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 did not use strict comparison for the legacy_salt so that limited authentication bypass could occur if using this functionality. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
References
Link | Resource |
---|---|
https://github.com/concretecms/concretecms/releases/8.5.10 | Release Notes Vendor Advisory |
https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes | Release Notes Vendor Advisory |
https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes | Release Notes Vendor Advisory |
https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31 | Vendor Advisory |
https://github.com/concretecms/concretecms/releases/9.1.3 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-11-14 15:15
Updated : 2022-11-16 21:20
NVD link : CVE-2022-43690
Mitre link : CVE-2022-43690
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
concretecms
- concrete_cms