CVE-2020-24619

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-24619
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24619.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-24619
Downstream
Published
2020-09-22T12:15:12Z
Modified
2025-10-15T12:10:17.148140Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.

References

Affected packages

Git / github.com/mltframework/shotcut

Affected ranges

Type
GIT
Repo
https://github.com/mltframework/shotcut
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

qt4-end

v14.*

v14.05
v14.06
v14.07
v14.08
v14.09
v14.10
v14.11
v14.12

v15.*

v15.01
v15.02
v15.03
v15.04
v15.05
v15.06
v15.07
v15.08
v15.09
v15.10
v15.11
v15.12

v16.*

v16.01
v16.02
v16.03
v16.04
v16.05
v16.06
v16.07
v16.08
v16.09
v16.10
v16.11
v16.12

v17.*

v17.01
v17.02
v17.03
v17.04
v17.05
v17.06
v17.08
v17.09
v17.10
v17.11
v17.12

v18.*

v18.01
v18.03
v18.03.06
v18.05
v18.05.08
v18.06
v18.06.02
v18.07
v18.08
v18.08.11
v18.08.14
v18.09.13
v18.09.15
v18.09.16
v18.10.01
v18.10.08
v18.11.04
v18.11.13
v18.11.18
v18.12.15
v18.12.23

v19.*

v19.01.19
v19.01.24
v19.01.27
v19.02.20
v19.02.28
v19.04.21
v19.04.30
v19.06.04
v19.06.15
v19.07.07
v19.07.15
v19.08.05
v19.08.16
v19.09.02
v19.09.14
v19.10.10
v19.10.20
v19.12.08
v19.12.16
v19.12.23
v19.12.31

v20.*

v20.02.02
v20.02.17
v20.04.01
v20.04.05
v20.04.12
v20.06.05
v20.06.14
v20.06.28
v20.07.11

Database specific

vanir_signatures

[
    {
        "signature_type": "Line",
        "id": "CVE-2020-24619-b2bacf3e",
        "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d",
        "signature_version": "v1",
        "target": {
            "file": "src/mainwindow.cpp"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "218835352193985310667251100491515934596",
                "14356802297276925708397881295076190062",
                "283624680693997055244457804723509477920",
                "316956125033937846239920343373399289822",
                "284496460002279050771324823534250079195",
                "156318147616756500413885702827517109168",
                "83309359447669589081561733789952682453",
                "205532388416644846912483906197458128777",
                "235108946773474358458222153130293560760",
                "318358985925431750142513381666330506001",
                "222734233440672528789425360235066704765",
                "55075922948617209456751417565219575959",
                "5525732070329115122821140372409217499",
                "224327118195763995293614638739610946651"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2020-24619-ba497661",
        "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d",
        "signature_version": "v1",
        "target": {
            "function": "MainWindow::showUpgradePrompt",
            "file": "src/mainwindow.cpp"
        },
        "digest": {
            "function_hash": "331677563975458575107632949369917438523",
            "length": 632.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2020-24619-d6a9f92f",
        "source": "https://github.com/mltframework/shotcut/commit/f008adc039642307f6ee3378d378cdb842e52c1d",
        "signature_version": "v1",
        "target": {
            "function": "MainWindow::on_actionUpgrade_triggered",
            "file": "src/mainwindow.cpp"
        },
        "digest": {
            "function_hash": "59977476673893318827283970166411004222",
            "length": 832.0
        },
        "deprecated": false
    }
]