{ "id": "CVE-2024-5936", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:18.317", "lastModified": "2024-06-27T19:25:12.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft." }, { "lang": "es", "value": "Existe una vulnerabilidad de redireccionamiento abierto en imartinez/privategpt versi\u00f3n 0.5.0 debido al manejo inadecuado del par\u00e1metro 'archivo'. Esta vulnerabilidad permite a los atacantes redirigir a los usuarios a una URL especificada mediante una entrada controlada por el usuario sin una validaci\u00f3n o sanitizaci\u00f3n adecuada. El impacto de esta vulnerabilidad incluye posibles ataques de phishing, distribuci\u00f3n de malware y robo de credenciales." } ], "metrics": { "cvssMetricV30": [ { "source": "security@huntr.dev", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@huntr.dev", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-601" } ] } ], "references": [ { "url": "https://huntr.com/bounties/43f05c1e-d7b8-45e2-b1fe-48faf1e3a48d", "source": "security@huntr.dev" } ] }