logo

CVE-2023-49279 umbraco.cms

Package

Manager: nuget
Name: umbraco.cms
Vulnerable Version: >=7.0.0 <7.15.11 || >=8.0.0 <8.18.9 || >=9.0.0 <10.7.0 || >=11.0.0 <11.5.0 || >=12.0.0 <12.2.0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00446 pctl0.62551

Details

Stored XSS via SVG File Upload #### Impact A user with access to the backoffice can upload SVG files that include scripts. If the user can trick another user to load the media directly in a browser, the scripts can be executed. #### Workaround Implement the server side file validation https://docs.umbraco.com/umbraco-cms/reference/security/serverside-file-validation or Serve all media from an different host (e.g cdn) that where umbraco is hosted

Metadata

Created: 2023-12-13T13:30:53Z
Modified: 2023-12-13T13:30:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6xmx-85x3-4cv2/GHSA-6xmx-85x3-4cv2.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-6xmx-85x3-4cv2
Finding: F425
Auto approve: 1