{"uuid": "2d69193c-0ea2-4cdc-ae92-53202d27515c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27873", "type": "seen", "source": "https://t.me/cibsecurity/47270", "content": "\u203c CVE-2022-27873 \u203c\n\nAn attacker can force the victim\u00e2\u20ac\u2122s device to perform arbitrary HTTP requests in WAN through a malicious SVG file being parsed by Autodesk Fusion 360\u00e2\u20ac\u2122s document parser. The vulnerability exists in the application\u00e2\u20ac\u2122s \u00e2\u20ac\u02dcInsert SVG\u00e2\u20ac\u2122 procedure. An attacker can also leverage this vulnerability to obtain victim\u00e2\u20ac\u2122s public IP and possibly other sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-29T20:13:46.000000Z"}