CVE-2024-47531

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47531
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47531.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47531
Aliases
  • GHSA-24xv-q29v-3h6r
Published
2024-09-30T16:15:09Z
Modified
2024-11-15T18:53:03.480515Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Scout is a web-based visualizer for VCF-files. Due to the lack of sanitization in the filename, it is possible bypass intended file extension and make users download malicious files with any extension. With malicious content injected inside the file data and users unknowingly downloading it and opening may lead to the compromise of users' devices or data. This vulnerability is fixed in 4.89.

References

Affected packages

Git / github.com/clinical-genomics/scout

Affected ranges

Type
GIT
Repo
https://github.com/clinical-genomics/scout
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0-rc1

3.*

3.5.2

4.*

4.1.0
4.1.1
4.1.2
4.1.3
4.1.4
4.10.0
4.10.1
4.11
4.11.1
4.12.2
4.12.3
4.12.4
4.14
4.14.1
4.15
4.15.1
4.16
4.16.1
4.2.0
4.2.1
4.21.1
4.3
4.3.1
4.7.2
4.8.2
4.8.3
4.9.0

Other

pre-update-2
update-master

v.*

v.4.4.0
v.4.4.1
v.4.5.0
v.4.5.1
v.4.6.0
v.4.6.1
v.4.7.0
v.4.7.1
v.4.8.1

v0.*

v0.2
v0.2.0-rc1
v0.2.0-rc2
v0.2.0-rc3

v1.*

v1.0.0
v1.0.0-rc1
v1.0.2
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.3.0
v1.4.0
v1.5.0

v2.*

v2.0.0
v2.1.0

v3.*

v3.0.0
v3.1.0
v3.2.0
v3.3.0
v3.4.0
v3.4.1
v3.5.0
v3.5.1

v4.*

v4.0.0
v4.13.1
v4.2.2
v4.21.2
v4.22
v4.23
v4.25
v4.26.1
v4.29
v4.3.2
v4.3.3
v4.30.1
v4.32
v4.33
v4.33.1
v4.35
v4.36
v4.38
v4.40
v4.41
v4.44
v4.45
v4.46
v4.49
v4.50
v4.51
v4.53
v4.54
v4.55
v4.56
v4.57
v4.58
v4.61
v4.61.1
v4.62
v4.63
v4.64
v4.65
v4.67
v4.69
v4.7.3
v4.70
v4.71
v4.72
v4.72.2
v4.72.4
v4.75
v4.76
v4.77
v4.78
v4.80
v4.82
v4.82.1
v4.82.2
v4.83
v4.84
v4.87
v4.87.1