CVE-2024-47530

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47530
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47530.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47530
Aliases
  • GHSA-3x45-2m34-x95v
Related
Published
2024-09-30T16:15:09Z
Modified
2024-11-15T18:52:43.121563Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.

References

Affected packages

Git / github.com/clinical-genomics/scout

Affected ranges

Type
GIT
Repo
https://github.com/clinical-genomics/scout
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0-rc1

3.*

3.5.2

4.*

4.1.0
4.1.1
4.1.2
4.1.3
4.1.4
4.10.0
4.10.1
4.11
4.11.1
4.12.2
4.12.3
4.12.4
4.14
4.14.1
4.15
4.15.1
4.16
4.16.1
4.2.0
4.2.1
4.21.1
4.3
4.3.1
4.7.2
4.8.2
4.8.3
4.9.0

Other

pre-update-2
update-master

v.*

v.4.4.0
v.4.4.1
v.4.5.0
v.4.5.1
v.4.6.0
v.4.6.1
v.4.7.0
v.4.7.1
v.4.8.1

v0.*

v0.2
v0.2.0-rc1
v0.2.0-rc2
v0.2.0-rc3

v1.*

v1.0.0
v1.0.0-rc1
v1.0.2
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.3.0
v1.4.0
v1.5.0

v2.*

v2.0.0
v2.1.0

v3.*

v3.0.0
v3.1.0
v3.2.0
v3.3.0
v3.4.0
v3.4.1
v3.5.0
v3.5.1

v4.*

v4.0.0
v4.13.1
v4.2.2
v4.21.2
v4.22
v4.23
v4.25
v4.26.1
v4.29
v4.3.2
v4.3.3
v4.30.1
v4.32
v4.33
v4.33.1
v4.35
v4.36
v4.38
v4.40
v4.41
v4.44
v4.45
v4.46
v4.49
v4.50
v4.51
v4.53
v4.54
v4.55
v4.56
v4.57
v4.58
v4.61
v4.61.1
v4.62
v4.63
v4.64
v4.65
v4.67
v4.69
v4.7.3
v4.70
v4.71
v4.72
v4.72.2
v4.72.4
v4.75
v4.76
v4.77
v4.78
v4.80
v4.82
v4.82.1
v4.82.2
v4.83
v4.84
v4.87
v4.87.1