{"id":"UBUNTU-CVE-2024-32484","details":"An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability.","modified":"2025-10-24T05:09:10Z","published":"2024-07-22T15:15:00Z","upstream":["CVE-2024-32484"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32484"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-32484"},{"type":"REPORT","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1995"}],"affected":[{"package":{"name":"anki","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/anki@2.0.32+dfsg-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.0.32+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_name":"anki","binary_version":"2.0.32+dfsg-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32484.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.0+dfsg~b36-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.0+dfsg~a12-0.1","2.1.0+dfsg~b24-1","2.1.0+dfsg~b25-1","2.1.0+dfsg~b26-1","2.1.0+dfsg~b27-1","2.1.0+dfsg~b29-1","2.1.0+dfsg~b31-1","2.1.0+dfsg~b33-1","2.1.0+dfsg~b34-1","2.1.0+dfsg~b35-1","2.1.0+dfsg~b36-1"],"ecosystem_specific":{"binaries":[{"binary_name":"anki","binary_version":"2.1.0+dfsg~b36-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32484.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.8+dfsg-1ubuntu1","2.1.15+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_name":"anki","binary_version":"2.1.15+dfsg-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32484.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-3ubuntu0.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.15+dfsg-3","2.1.15+dfsg-3ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"anki","binary_version":"2.1.15+dfsg-3ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32484.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-3ubuntu4.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.15+dfsg-3ubuntu1","2.1.15+dfsg-3ubuntu2","2.1.15+dfsg-3ubuntu3","2.1.15+dfsg-3ubuntu4","2.1.15+dfsg-3ubuntu4.1"],"ecosystem_specific":{"binaries":[{"binary_name":"anki","binary_version":"2.1.15+dfsg-3ubuntu4.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-32484.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}