Description
An attacker can force the victim’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360’s document parser. The vulnerability exists in the application’s ‘Insert SVG’ procedure. An attacker can also leverage this vulnerability to obtain victim’s public IP and possibly other sensitive information.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32361 | An attacker can force the victim’s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360’s document parser. The vulnerability exists in the application’s ‘Insert SVG’ procedure. An attacker can also leverage this vulnerability to obtain victim’s public IP and possibly other sensitive information. |
References
History
No history.
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2024-08-03T05:41:10.218Z
Reserved: 2022-03-25T00:00:00.000Z
Link: CVE-2022-27873
No data.
Status : Modified
Published: 2022-07-29T16:15:08.827
Modified: 2024-11-21T06:56:22.410
Link: CVE-2022-27873
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD