{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-12181","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-12-04T16:30:48.958Z","datePublished":"2024-12-04T22:00:14.645Z","dateUpdated":"2024-12-05T14:52:40.916Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-12-04T22:00:14.645Z"},"title":"DedeCMS SWF File uploads_add.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"n/a","product":"DedeCMS","versions":[{"version":"5.7.116","status":"affected"}],"modules":["SWF File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In DedeCMS 5.7.116 wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /member/uploads_add.php der Komponente SWF File Handler. Dank Manipulation des Arguments mediatype mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-12-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-12-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-12-04T17:36:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jiashenghe (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.286903","name":"VDB-286903 | DedeCMS SWF File uploads_add.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.286903","name":"VDB-286903 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.452983","name":"Submit #452983 | DedeCMS V5.7.116 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/Hebing123/cve/issues/77","tags":["exploit","issue-tracking"]}]},"adp":[{"affected":[{"vendor":"dedecms","product":"dedecms","cpes":["cpe:2.3:a:dedecms:dedecms:5.7.116:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"5.7.116","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-05T14:52:02.413459Z","id":"CVE-2024-12181","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-05T14:52:40.916Z"}}]}}