CVE-2024-41256

Default configurations in the ShareProofVerifier function of filestash v0.4 causes the application to skip the TLS certificate verification process when sending out email verification codes, possibly allowing attackers to access sensitive data via a man-in-the-middle attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*

History

15 Aug 2024, 14:27

Type Values Removed Values Added
First Time Filestash filestash
Filestash
CWE CWE-295
CPE cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - () https://gist.github.com/nyxfqq/a6da3fe6128b978ea1aaa5df639d5f98 - Third Party Advisory

01 Aug 2024, 12:42

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 21:15

Updated : 2025-03-18 18:15


NVD link : CVE-2024-41256

Mitre link : CVE-2024-41256

CVE.ORG link : CVE-2024-41256


JSON object : View

Products Affected

filestash

  • filestash
CWE
CWE-295

Improper Certificate Validation