Description
filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4jmm-c6jw-g796 | Filestash configured to skip TLS certificate verification when using the FTPS protocol |
References
History
Mon, 29 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filestash
Filestash filestash |
|
| CPEs | cpe:2.3:a:filestash:filestash:0.4:*:*:*:*:*:*:* | |
| Vendors & Products |
Filestash
Filestash filestash |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-01T14:45:04.150Z
Reserved: 2024-07-18T00:00:00.000Z
Link: CVE-2024-41255
Updated: 2024-08-01T14:43:30.689Z
Status : Analyzed
Published: 2024-07-31T21:15:18.030
Modified: 2025-09-29T14:08:17.620
Link: CVE-2024-41255
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA