Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-47531
HistorySep 30, 2024 - 3:26 p.m.

CVE-2024-47531 Scout contains insufficient output escaping of attachment names

2024-09-3015:26:49
CWE-116
GitHub_M
www.cve.org
1
scout
web-based visualizer
vcf-files
insufficient output escaping
malicious files
compromise
vulnerability
fixed

CVSS3

4.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

EPSS

0

Percentile

9.6%

Scout is a web-based visualizer for VCF-files. Due to the lack of sanitization in the filename, it is possible bypass intended file extension and make users download malicious files with any extension. With malicious content injected inside the file data and users unknowingly downloading it and opening may lead to the compromise of users’ devices or data. This vulnerability is fixed in 4.89.

CNA Affected

[
  {
    "vendor": "Clinical-Genomics",
    "product": "scout",
    "versions": [
      {
        "version": "<= 4.88.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-47531