Session 1.17.5 - LFR via chat attachment
4,4
Medium
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Session 1.17.5 - LFR via chat attachment
Code name
State
Public
Release date
29 feb 2024
Affected product
Session
Affected version(s)
Version 1.17.5
Vulnerability name
Business information leak
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v3.1 base score
4.4
Exploit available
Yes
CVE ID(s)
Description
Session version 1.17.5 allows obtaining internal application files and public files from the user's device without the user's consent. This is possible because the application is vulnerable to Local File Read via chat attachments.
Vulnerability
An arbitrary local file reading (LFR) vulnerability has been identified in Session. The exploit allows an attacker to obtain internal application files or files from public paths accessed by the application such as images, downloads, etc.
Exploit
Our security policy
We have reserved the ID CVE-2024-2045 to refer to this issue from now on.
System Information
Version: Session 1.17.5
Operating System: Android
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/oxen-io/session-android/
Timeline
IA generativa
21 feb 2024
Vendor contacted
21 feb 2024
Public disclosure
29 feb 2024