An attacker could retrieve sensitive files (medical images) as well as plant new medical images or overwrite existing medical images on a MicroDicom DICOM Viewer system. User interaction is required to exploit this vulnerability.
The product uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dicom_viewer | Microdicom | * | 2024.2 (excluding) |