Learn about CVE-2022-30117 affecting Concrete CMS versions 8.5.7 and below, and 9.0 through 9.0.2, allowing for an Arbitrary File Delete exploit. Find mitigation steps here.
This CVE-2022-30117 concerns the Concrete CMS versions 8.5.7 and below, as well as versions 9.0 through 9.0.2, allowing traversal in /index.php/ccm/system/file/upload, potentially resulting in an Arbitrary File Delete exploit.
Understanding CVE-2022-30117
This vulnerability, ranked 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H, was reported by Siebene and addressed by the Concrete CMS Security team.
What is CVE-2022-30117?
Concrete CMS versions 8.5.7 and below, along with versions 9.0 through 9.0.2, are susceptible to traversal in /index.php/ccm/system/file/upload, potentially leading to an Arbitrary File Delete exploit.
The Impact of CVE-2022-30117
The vulnerability could allow an attacker to perform arbitrary file deletions, posing a risk to the confidentiality, integrity, and availability of the affected system.
Technical Details of CVE-2022-30117
The following details outline the vulnerability's specifics:
Vulnerability Description
The issue was remediated by sanitizing /index.php/ccm/system/file/upload and adjusting isFullChunkFilePresent to prevent unauthorized traversal.
Affected Systems and Versions
Versions affected include Concrete CMS 8.5.7 and below, as well as Concrete 9.0 through 9.0.2.
Exploitation Mechanism
Attackers could exploit the traversal vulnerability in /index.php/ccm/system/file/upload to delete arbitrary files on the target system.
Mitigation and Prevention
To mitigate the CVE-2022-30117 vulnerability, follow these recommendations:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates and apply patches promptly to protect against potential exploits.