AirDroid 1.0.4 beta implements authentication through direct transmission of a password hash over HTTP, which makes it easier for remote attackers to obtain access by sniffing the local wireless network and then replaying the authentication data.
References
Link | Resource |
---|---|
http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt | Exploit |
http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html | Exploit |
Configurations
Information
Published : 2012-07-26 15:55
Updated : 2012-07-26 21:00
NVD link : CVE-2012-3884
Mitre link : CVE-2012-3884
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
airdroid
- airdroid