Page 3 of 12 results (0.003 seconds)

CVSS: 8.0EPSS: 1%CPEs: 1EXPL: 2

In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL's protocol is common. If it is common, the URL will be opened externally. • https://benjamin-altpeter.de/shell-openexternal-dangers https://github.com/wireapp/wire-desktop/commit/b3705fffa75a03f055530f55a754face5ac0623b https://github.com/wireapp/wire-desktop/security/advisories/GHSA-5gpx-9976-ggpm • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Wire application before 2018-03-07 for Android allows attackers to write to pathnames outside of the downloads directory via a ../ in a filename of a received file, related to AssetService.scala. La aplicación Wire, en versiones anteriores a 2018-03-07 para Android, permite que atacantes escriban en nombres de ruta fuera del directorio de descargas mediante un ../ en el nombre de archivo de un archivo recibido. Esto se relaciona con AssetService.scala. • https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •