Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-47530
HistorySep 30, 2024 - 3:17 p.m.

CVE-2024-47530 Scout contains an Open Redirect on Login via `next`

2024-09-3015:17:39
CWE-601
GitHub_M
github.com
4
scout
vcf-files
visualizer
open redirect
phishing
malicious page
login api
sanitization
scheme validation
https downgrade
vulnerability
fixed 4.89

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

26.7%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:clinical-genomics:scout:-:*:*:*:*:*:*:*"
    ],
    "vendor": "clinical-genomics",
    "product": "scout",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "4.89",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

26.7%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-47530