We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-3434

QRC Handler without Input Validation in Jami



Description

Improper Input Validation in the hyperlink interpretation in Savoir-faire Linux's Jami (version 20222284) on Windows. This allows an attacker to send a custom HTML anchor tag to pass a string value to the Windows QRC Handler through the Jami messenger.

Reserved 2023-06-27 | Published 2023-07-14 | Updated 2024-10-22 | Assigner BLSOPS


MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

20222284
affected

References

review.jami.net/c/jami-client-qt/+/23569

git.jami.net/...rfairelinux/jami-client-qt/-/wikis/Changelog

blog.blacklanternsecurity.com/...QRC-Handler-Vulnerabilities

cve.org (CVE-2023-3434)

nvd.nist.gov (CVE-2023-3434)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-3434

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.