{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2045","assignerOrgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","state":"PUBLISHED","assignerShortName":"Fluid Attacks","dateReserved":"2024-02-29T23:31:27.739Z","datePublished":"2024-02-29T23:37:37.339Z","dateUpdated":"2025-05-19T16:56:56.891Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Session","vendor":"Session","versions":[{"status":"affected","version":"1.17.5"}]}],"datePublic":"2024-02-29T23:33:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>Session version 1.17.5 allows obtaining internal application files and public</div><div>files from the user's device without the user's consent. This is possible</div><div>because the application is vulnerable to Local File Read via chat attachments.</div></div><br>"}],"value":"Session version 1.17.5 allows obtaining internal application files and public\n\nfiles from the user's device without the user's consent. This is possible\n\nbecause the application is vulnerable to Local File Read via chat attachments."}],"impacts":[{"capecId":"CAPEC-131","descriptions":[{"lang":"en","value":"CAPEC-131 Resource Leak Exposure"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","shortName":"Fluid Attacks","dateUpdated":"2025-05-19T16:56:56.891Z"},"references":[{"url":"https://fluidattacks.com/advisories/newman/"},{"url":"https://github.com/oxen-io/session-android/"}],"source":{"discovery":"EXTERNAL"},"title":"Session 1.17.5 - LFR via chat attachment","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"opft","product":"session","cpes":["cpe:2.3:a:opft:session:1.17.5:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"1.17.5","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-06T18:55:34.971070Z","id":"CVE-2024-2045","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-26T17:52:53.454Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:03:37.761Z"},"title":"CVE Program Container","references":[{"url":"https://fluidattacks.com/advisories/newman/","tags":["x_transferred"]},{"url":"https://github.com/oxen-io/session-android/","tags":["x_transferred"]}]}]}}