Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.
References
Link | Resource |
---|---|
https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 | Third Party Advisory |
Configurations
History
15 Aug 2024, 14:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - Third Party Advisory | |
First Time |
Filestash filestash
Filestash |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:* | |
CWE | CWE-295 |
01 Aug 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
31 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-31 21:15
Updated : 2024-08-15 14:27
NVD link : CVE-2024-41256
Mitre link : CVE-2024-41256
CVE.ORG link : CVE-2024-41256
JSON object : View
Products Affected
filestash
- filestash
CWE
CWE-295
Improper Certificate Validation