{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-48927","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-10-09T22:06:46.174Z","datePublished":"2024-10-22T15:50:46.892Z","dateUpdated":"2024-10-22T16:07:12.486Z"},"containers":{"cna":{"title":"Potential Code Execution Risk When Viewing SVG Files in Full Screen in Backoffice","problemTypes":[{"descriptions":[{"cweId":"CWE-74","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh"}],"affected":[{"vendor":"umbraco","product":"Umbraco-CMS","versions":[{"version":">= 13.0.0, < 13.5.2","status":"affected"},{"version":">= 10.0.0, < 10.8.7","status":"affected"},{"version":">= 8.0.0, < 8.18.15","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-10-22T15:54:20.783Z"},"descriptions":[{"lang":"en","value":"Umbraco, a free and open source .NET content management system, has a remote code execution issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. There is a potential risk of code execution for Backoffice users when they “preview” SVG files in full screen mode. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue. As a workaround, derver-side file validation is available to strip script tags from file's content during the file upload process."}],"source":{"advisory":"GHSA-5955-cwv4-h7qh","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"umbraco","product":"umbraco_cms","cpes":["cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"13.0.0","status":"affected","lessThanOrEqual":"13.5.2","versionType":"custom"},{"version":"10.0.0","status":"affected","lessThanOrEqual":"10.8.7","versionType":"custom"},{"version":"8.0.0","status":"affected","lessThanOrEqual":"8.18.15","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-22T16:05:35.834799Z","id":"CVE-2024-48927","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-22T16:07:12.486Z"}}]}}