{
    "CVE_data_meta": {
        "ASSIGNER": "psirt@adobe.com",
        "DATE_PUBLIC": "2021-04-22T23:00:00.000Z",
        "ID": "CVE-2021-21102",
        "STATE": "PUBLIC",
        "TITLE": "Adobe Illustrator DOCX file parsing directory traversal vulnerability could lead to remote code execution"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "Illustrator",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "<=",
                                            "version_value": "25.2"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "Adobe"
                }
            ]
        }
    },
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "Adobe Illustrator version 25.2 (and earlier) is affected by a Path Traversal vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
            }
        ]
    },
    "impact": {
        "cvss": {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "userInteraction": "Required",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "refsource": "MISC",
                "url": "https://helpx.adobe.com/security/products/illustrator/apsb21-24.html",
                "name": "https://helpx.adobe.com/security/products/illustrator/apsb21-24.html"
            }
        ]
    },
    "source": {
        "discovery": "EXTERNAL"
    }
}