All the vulnerabilites related to Unknown - Safe SVG
cve-2022-1091
Vulnerability from cvelistv5
Published
2022-04-18 17:10
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
Safe SVG < 1.9.10 - SVG Sanitisation Bypass
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3 | x_refsource_MISC | |
https://github.com/10up/safe-svg/pull/28 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/10up/safe-svg/pull/28" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Safe SVG", "vendor": "Unknown", "versions": [ { "lessThan": "1.9.10", "status": "affected", "version": "1.9.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "David Hamann" } ], "descriptions": [ { "lang": "en", "value": "The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T17:10:54", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/10up/safe-svg/pull/28" } ], "source": { "discovery": "EXTERNAL" }, "title": "Safe SVG \u003c 1.9.10 - SVG Sanitisation Bypass", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-1091", "STATE": "PUBLIC", "TITLE": "Safe SVG \u003c 1.9.10 - SVG Sanitisation Bypass" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Safe SVG", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.9.10", "version_value": "1.9.10" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "David Hamann" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks)." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3" }, { "name": "https://github.com/10up/safe-svg/pull/28", "refsource": "CONFIRM", "url": "https://github.com/10up/safe-svg/pull/28" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-1091", "datePublished": "2022-04-18T17:10:54", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-02T23:47:43.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8378
Vulnerability from cvelistv5
Published
2024-11-07 15:07
Modified
2024-11-07 19:53
Severity ?
EPSS score ?
Summary
Safe SVG < 2.2.6 - Author+ SVG Sanitisation Bypass
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/ | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:10up:safe_svg:-:*:*:*:*:wordpress:*:*" ], "defaultStatus": "unaffected", "product": "safe_svg", "vendor": "10up", "versions": [ { "lessThan": "2.2.6", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-8378", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T18:32:21.537815Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T19:53:59.721Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Safe SVG", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.6", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alexander Concha" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Safe SVG WordPress plugin before 2.2.6 has its sanitisation code is only running for paths that call wp_handle_upload, but not for example for code that uses wp_handle_sideload which is often used to upload attachments via raw POST data." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T15:07:36.788Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Safe SVG \u003c 2.2.6 - Author+ SVG Sanitisation Bypass", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-8378", "datePublished": "2024-11-07T15:07:36.788Z", "dateReserved": "2024-09-02T17:27:58.657Z", "dateUpdated": "2024-11-07T19:53:59.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }