CVE-2024-41256

Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*

History

15 Aug 2024, 14:27

Type Values Removed Values Added
CPE cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - Third Party Advisory
CWE CWE-295
First Time Filestash
Filestash filestash

31 Jul 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 21:15

Updated : 2025-03-18 18:15


NVD link : CVE-2024-41256

Mitre link : CVE-2024-41256


JSON object : View

Products Affected

filestash

  • filestash
CWE
CWE-295

Improper Certificate Validation