Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:* |
Mon, 30 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Clinical-genomics
Clinical-genomics scout |
|
CPEs | cpe:2.3:a:clinical-genomics:scout:-:*:*:*:*:*:*:* | |
Vendors & Products |
Clinical-genomics
Clinical-genomics scout |
|
Metrics |
ssvc
|
Mon, 30 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89. | |
Title | Scout contains an Open Redirect on Login via `next` | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-30T15:17:39.731Z
Updated: 2024-09-30T15:45:37.010Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47530
Vulnrichment
Updated: 2024-09-30T15:45:26.143Z
NVD
Status : Analyzed
Published: 2024-09-30T16:15:09.540
Modified: 2024-11-15T18:03:06.497
Link: CVE-2024-47530
Redhat
No data.