cve/2024/CVE-2024-47531.md

18 lines
981 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-47531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47531)
![](https://img.shields.io/static/v1?label=Product&message=scout&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%204.88.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brighgreen)
### Description
Scout is a web-based visualizer for VCF-files. Due to the lack of sanitization in the filename, it is possible bypass intended file extension and make users download malicious files with any extension. With malicious content injected inside the file data and users unknowingly downloading it and opening may lead to the compromise of users' devices or data. This vulnerability is fixed in 4.89.
### POC
#### Reference
- https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-24xv-q29v-3h6r
#### Github
No PoCs found on GitHub currently.