Multiple vulnerabilities in Umbraco CMS



| Updated: 2024-10-23
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2024-48927
CVE-2024-48929
CVE-2024-48926
CWE-ID CWE-434
CWE-613
Exploitation vector Network
Public exploit N/A
Vulnerable software
Umbraco CMS
Web applications / CMS

Vendor Umbraco

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Dangerous file upload

EUVDB-ID: #VU99234

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48927

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability exists due to the application allows to upload SVG files to the server. A remote user can upload a specially crafted SVG file with an arbitrary JavaScript code inside and execute ti in the victim's browser in the security context of the website once the image is viewed.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Umbraco CMS: 8.0.0 - 13.5.1

CPE2.3 External links

https://github.com/umbraco/Umbraco-CMS/releases/tag/release-13.5.2
https://github.com/umbraco/Umbraco-CMS/releases/tag/release-10.8.7
https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Insufficient Session Expiration

EUVDB-ID: #VU99269

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48929

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient session expiration issue during an explicit sign-out. A remote non-authenticated attacker can obtain or guess session token and gain unauthorized access to session that belongs to another user.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Umbraco CMS: 10.0.0 - 13.5.1

CPE2.3 External links

https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wxw9-6pv9-c3xc


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Insufficient Session Expiration

EUVDB-ID: #VU99268

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48926

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to Backoffice displays the logout page with a session timeout message before the server session has fully expired, causing users to believe they have been logged out approximately 30 seconds before they actually are.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Umbraco CMS: 8.0.0 - 13.5.1

CPE2.3 External links

https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-fp6q-gccw-7qqm


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###