concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators.
                
            References
                    | Link | Resource | 
|---|---|
| http://zeroday.insecurity.zone/exploits/concrete5_csrf_dos.txt | Exploit Third Party Advisory | 
| https://drive.google.com/open?id=0B3vXUYdNMECWZTd3SFRnUjllWk0 | Exploit | 
| https://twitter.com/insecurity/status/856066923146215425 | Third Party Advisory | 
| http://zeroday.insecurity.zone/exploits/concrete5_csrf_dos.txt | Exploit Third Party Advisory | 
| https://drive.google.com/open?id=0B3vXUYdNMECWZTd3SFRnUjllWk0 | Exploit | 
| https://twitter.com/insecurity/status/856066923146215425 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2017-04-24 06:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-8082
Mitre link : CVE-2017-8082
CVE.ORG link : CVE-2017-8082
JSON object : View
Products Affected
                concretecms
- concrete_cms
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
