Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:* |
Mon, 30 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Clinical-genomics
Clinical-genomics scout |
|
CPEs | cpe:2.3:a:clinical-genomics:scout:-:*:*:*:*:*:*:* | |
Vendors & Products |
Clinical-genomics
Clinical-genomics scout |
|
Metrics |
ssvc
|
Mon, 30 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89. | |
Title | Scout contains an Open Redirect on Login via `next` | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-30T15:45:37.010Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47530

Updated: 2024-09-30T15:45:26.143Z

Status : Analyzed
Published: 2024-09-30T16:15:09.540
Modified: 2024-11-15T18:03:06.497
Link: CVE-2024-47530

No data.