CVE-2022-43693

Concrete CMS is vulnerable to CSRF due to the lack of "State" parameter for external Concrete authentication service for users of Concrete who use the "out of the box" core OAuth.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*

History

17 Nov 2022, 21:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
CWE CWE-352
References (MISC) https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes - (MISC) https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes - Release Notes, Vendor Advisory
References (MISC) https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31 - (MISC) https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31 - Vendor Advisory
References (MISC) https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes - (MISC) https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes - Release Notes, Vendor Advisory
References (MISC) https://github.com/concretecms/concretecms/releases/8.5.10 - (MISC) https://github.com/concretecms/concretecms/releases/8.5.10 - Patch, Release Notes, Third Party Advisory
References (MISC) https://github.com/concretecms/concretecms/releases/9.1.3 - (MISC) https://github.com/concretecms/concretecms/releases/9.1.3 - Patch, Release Notes, Third Party Advisory
First Time Concretecms
Concretecms concrete Cms

14 Nov 2022, 17:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-14 17:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-43693

Mitre link : CVE-2022-43693

CVE.ORG link : CVE-2022-43693


JSON object : View

Products Affected

concretecms

  • concrete_cms
CWE
CWE-352

Cross-Site Request Forgery (CSRF)