CVE-2024-47531

Sept. 30, 2024, 4:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Scout

  • 4.0
  • 4.1
  • 4.2
  • 4.3
  • 4.4
  • 4.5
  • 4.6.x-4.88

Source

security-advisories@github.com

Tags

CVE-2024-47531 details

Published : Sept. 30, 2024, 4:15 p.m.
Last Modified : Sept. 30, 2024, 4:15 p.m.

Description

Scout is a web-based visualizer for VCF-files. Due to the lack of sanitization in the filename, it is possible bypass intended file extension and make users download malicious files with any extension. With malicious content injected inside the file data and users unknowingly downloading it and opening may lead to the compromise of users' devices or data. This vulnerability is fixed in 4.89.

CVSS Score

1 2 3 4.6 5 6 7 8 9 10

Weakness

Weakness Name Description
CWE-116 Improper Encoding or Escaping of Output The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

Base Score

4.6

Exploitability Score

2.1

Impact Score

2.5

Base Severity

MEDIUM

This website uses the NVD API, but is not approved or certified by it.