Improper Input Validation in the hyperlink interpretation in Savoir-faire Linux's Jami (version 20222284) on Windows.
This allows an attacker to send a custom HTML anchor tag to pass a string value to the Windows QRC Handler through the Jami messenger.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.blacklanternsecurity.com/p/Jami-Local-Denial-Of-Service-and-QRC-Handler-Vulnerabilities - Broken Link | |
References | () https://git.jami.net/savoirfairelinux/jami-client-qt/-/wikis/Changelog#nightly-january-10 - Release Notes | |
References | () https://review.jami.net/c/jami-client-qt/+/23569 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
Information
Published : 2023-07-14 13:15
Updated : 2024-11-21 08:17
NVD link : CVE-2023-3434
Mitre link : CVE-2023-3434
CVE.ORG link : CVE-2023-3434
JSON object : View
Products Affected
savoirfairelinux
- jami
microsoft
- windows
CWE