concrete5/concrete5 is vulnerable to server-side request forgery (SSRF). The vulnerability exists in file.php
because the server doesn’t specify the validated IPs when downloading files which allows an attacker to access cloud and download files from the local network.
documentation.concretecms.org/developers/introduction/version-history/857-release-notes
github.com/advisories/GHSA-mcxr-fx5f-96qq
github.com/concrete5/concrete5-core/commit/505c8d2ebcb04f53e45a29e67cfc354c13481967
github.com/concrete5/concrete5/commit/d22102d46aafd0e60d6dfc750d8e3ddaf40f2633
github.com/concrete5/concrete5/pull/9975
hackerone.com/reports/1369312