cvelist/2024/38xxx/CVE-2024-38272.json

82 lines
2.6 KiB
JSON
Raw Normal View History

2024-06-12 11:00:31 +00:00
{
2024-06-26 16:00:34 +00:00
"data_version": "4.0",
2024-06-12 11:00:31 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-38272",
2024-06-26 16:00:34 +00:00
"ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
2024-06-12 11:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-07-29 22:00:36 +00:00
"value": "There exists a vulnerability in Quick Share/Nearby, where an attacker can bypass the accept file dialog on Quick Share Windows.\u00a0Normally in Quick Share Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quick Share or above"
2024-06-26 16:00:34 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-294 Authentication Bypass by Capture-replay",
"cweId": "CWE-294"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Nearby",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.0.1724.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/google/nearby/pull/2589",
"refsource": "MISC",
"name": "https://github.com/google/nearby/pull/2589"
},
{
"url": "https://github.com/google/nearby/pull/2402",
"refsource": "MISC",
"name": "https://github.com/google/nearby/pull/2402"
2024-06-12 11:00:31 +00:00
}
]
2024-06-26 16:00:34 +00:00
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
2024-07-29 22:00:36 +00:00
},
"credits": [
{
"lang": "en",
"value": "Or Yair and Shmuel Cohen with SafeBreach"
}
]
2024-06-12 11:00:31 +00:00
}