{"containers":{"cna":{"affected":[{"product":"https://github.com/concrete5/concrete5","vendor":"n/a","versions":[{"status":"affected","version":"Fixed version Concrete CMS 8.5.7 and 9.0"}]}],"descriptions":[{"lang":"en","value":"Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: \"Solar Security Research Team\"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.0"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"Insecure Direct Object Reference (IDOR) (CWE-639)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-19T18:10:14.000Z","orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone"},"references":[{"tags":["x_refsource_MISC"],"url":"https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes"},{"tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/1102014"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"support@hackerone.com","ID":"CVE-2021-22951","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"https://github.com/concrete5/concrete5","version":{"version_data":[{"version_value":"Fixed version Concrete CMS 8.5.7 and 9.0"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: \"Solar Security Research Team\"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.0"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Insecure Direct Object Reference (IDOR) (CWE-639)"}]}]},"references":{"reference_data":[{"name":"https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes","refsource":"MISC","url":"https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes"},{"name":"https://hackerone.com/reports/1102014","refsource":"MISC","url":"https://hackerone.com/reports/1102014"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:58:26.191Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/1102014"}]}]},"cveMetadata":{"assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","cveId":"CVE-2021-22951","datePublished":"2021-11-19T18:10:14.000Z","dateReserved":"2021-01-06T00:00:00.000Z","dateUpdated":"2024-08-03T18:58:26.191Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}