{"vulnerability": "CVE-2024-45612", "sightings": [{"uuid": "682f0acb-3cd5-4a87-9ffc-b30cbeb128a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45612", "type": "seen", "source": "https://t.me/cvedetector/5839", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45612 - Contao Canonical Tag Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45612 \nPublished : Sept. 17, 2024, 7:15 p.m. | 38\u00a0minutes ago \nDescription : Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T22:18:15.000000Z"}]}