{
    "CVE_data_meta": {
        "ASSIGNER": "psirt@adobe.com",
        "DATE_PUBLIC": "2021-08-16T23:00:00.000Z",
        "ID": "CVE-2021-36048",
        "STATE": "PUBLIC",
        "TITLE": "XMP Toolkit SDK Improper Input Validation Could Lead To Arbitrary Code Execution"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "XMP Toolkit",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "<=",
                                            "version_value": "2020.1"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "Adobe"
                }
            ]
        }
    },
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file."
            }
        ]
    },
    "impact": {
        "cvss": {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "userInteraction": "Required",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "Improper Input Validation (CWE-20)"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "refsource": "MISC",
                "url": "https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html",
                "name": "https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html"
            },
            {
                "refsource": "MLIST",
                "name": "[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update",
                "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html"
            }
        ]
    },
    "source": {
        "discovery": "EXTERNAL"
    }
}