First published: Tue Dec 12 2023(Updated: )
#### Impact A user with access to the backoffice can upload SVG files that include scripts. If the user can trick another user to load the media directly in a browser, the scripts can be executed. #### Workaround Implement the server side file validation https://docs.umbraco.com/umbraco-cms/reference/security/serverside-file-validation or Serve all media from an different host (e.g cdn) that where umbraco is hosted
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Umbraco.CMS | >=12.0.0<12.2.0 | 12.2.0 |
nuget/Umbraco.CMS | >=11.0.0<11.5.0 | 11.5.0 |
nuget/Umbraco.CMS | >=9.0.0<10.7.0 | 10.7.0 |
nuget/Umbraco.CMS | >=8.0.0<8.18.9 | 8.18.9 |
nuget/Umbraco.CMS | >=7.0.0<7.15.11 | 7.15.11 |
Umbraco CMS | >=7.0.0<7.15.11 | |
Umbraco CMS | >=8.0.0<8.18.9 | |
Umbraco CMS | >=10.0.0<10.7.0 | |
Umbraco CMS | >=11.0.0<11.5.0 | |
Umbraco CMS | >=12.0.0<12.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49279 allows an attacker to execute scripts through maliciously crafted SVG files, indicating a high severity risk.
To fix CVE-2023-49279, implement server-side file validation to prevent the upload of SVG files containing scripts.
CVE-2023-49279 affects Umbraco CMS versions from 7.0.0 to 12.2.0.
Yes, you can mitigate CVE-2023-49279 by implementing server-side file validation regardless of version.
CVE-2023-49279 can facilitate cross-site scripting (XSS) attacks if a user is tricked into loading a malicious SVG file.