Access Restriction Bypass Affecting concrete5/concrete5 package, versions <8.5.0>=9.0.0RC1, <9.1.3


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-CONCRETE5CONCRETE5-3114422
  • published15 Nov 2022
  • disclosed15 Nov 2022
  • creditBogdan and Adrian Tiron from FORTBRIDGE

Introduced: 15 Nov 2022

CVE-2022-43690  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade concrete5/concrete5 to version 8.5.0, 9.1.3 or higher.

Overview

concrete5/concrete5 is a concrete5 open source CMS.

Affected versions of this package are vulnerable to Access Restriction Bypass when a strict comparison is not used for the legacy_salt.

Note: Exploiting this vulnerability is possible only when the following conditions exist:

  1. Concrete was used to compare integers instead of strings.

  2. The attacked user signed up when the site was concrete5 ~v5.4, and the attacked user has not logged in since the site was updated above v5.4

  3. The password hash for the user-generated just right to look like an integer like "0b1111111"

CVSS Scores

version 3.1