Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.
References
Link | Resource |
---|---|
https://github.com/Clinical-Genomics/scout/commit/50055edfca9a7183b248019af97e1fb0b0065a02 | Patch |
https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-3x45-2m34-x95v | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-09-30 16:15
Updated : 2024-11-15 18:03
NVD link : CVE-2024-47530
Mitre link : CVE-2024-47530
CVE.ORG link : CVE-2024-47530
JSON object : View
Products Affected
clinical-genomics
- scout
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')