signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
References
Link | Resource |
---|---|
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 | Third Party Advisory |
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 | Third Party Advisory |
Information
Published : 2020-05-07 16:15
Updated : 2020-05-12 13:15
NVD link : CVE-2014-1423
Mitre link : CVE-2014-1423
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
signond_project
- signond
ubports
- ubuntu_touch