In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.
[ { "signature_type": "Line", "id": "CVE-2020-24619-b2bacf3e", "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d", "signature_version": "v1", "target": { "file": "src/mainwindow.cpp" }, "digest": { "threshold": 0.9, "line_hashes": [ "218835352193985310667251100491515934596", "14356802297276925708397881295076190062", "283624680693997055244457804723509477920", "316956125033937846239920343373399289822", "284496460002279050771324823534250079195", "156318147616756500413885702827517109168", "83309359447669589081561733789952682453", "205532388416644846912483906197458128777", "235108946773474358458222153130293560760", "318358985925431750142513381666330506001", "222734233440672528789425360235066704765", "55075922948617209456751417565219575959", "5525732070329115122821140372409217499", "224327118195763995293614638739610946651" ] }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2020-24619-ba497661", "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d", "signature_version": "v1", "target": { "function": "MainWindow::showUpgradePrompt", "file": "src/mainwindow.cpp" }, "digest": { "function_hash": "331677563975458575107632949369917438523", "length": 632.0 }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2020-24619-d6a9f92f", "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d", "signature_version": "v1", "target": { "function": "MainWindow::on_actionUpgrade_triggered", "file": "src/mainwindow.cpp" }, "digest": { "function_hash": "59977476673893318827283970166411004222", "length": 832.0 }, "deprecated": false } ]