CVE-2022-31246

paymentrequest.py in Electrum before 4.2.2 allows a file:// URL in the r parameter of a payment request (e.g., within QR code data). On Windows, this can lead to capture of credentials over SMB. On Linux and UNIX, it can lead to a denial of service by specifying the /dev/zero filename.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:electrum:electrum:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 - Third Party Advisory () https://github.com/spesmilo/electrum/security/advisories/GHSA-4fh4-hx35-r355 - Third Party Advisory
References () https://twitter.com/ElectrumWallet/status/1534540879905665028 - Release Notes, Third Party Advisory () https://twitter.com/ElectrumWallet/status/1534540879905665028 - Release Notes, Third Party Advisory

Information

Published : 2022-06-17 14:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31246

Mitre link : CVE-2022-31246

CVE.ORG link : CVE-2022-31246


JSON object : View

Products Affected

electrum

  • electrum

microsoft

  • windows
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')