CVE-2024-41256

Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*

History

15 Aug 2024, 14:27

Type Values Removed Values Added
References () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - Third Party Advisory
First Time Filestash filestash
Filestash
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
CPE cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
CWE CWE-295

01 Aug 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) Las configuraciones predeterminadas en la función ShareProofVerifier de filestash v0.4 hacen que la aplicación omita el proceso de verificación del certificado TLS al enviar códigos de verificación por correo electrónico, lo que posiblemente permita a los atacantes acceder a datos confidenciales a través de un ataque de man-in-the-middle.

31 Jul 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 21:15

Updated : 2024-08-15 14:27


NVD link : CVE-2024-41256

Mitre link : CVE-2024-41256

CVE.ORG link : CVE-2024-41256


JSON object : View

Products Affected

filestash

  • filestash
CWE
CWE-295

Improper Certificate Validation