The Boozt Fashion application before 2.3.4 for Android allows remote attackers to read login credentials by sniffing the network and leveraging the lack of SSL. NOTE: the vendor response, before the application was changed to enable SSL logins, was "At the moment that is an accepted risk. We only have https on the checkout part of the site."
References
Link | Resource |
---|---|
https://wwws.nightwatchcybersecurity.com/2017/07/27/boozt-fashion-android-app-didnt-use-ssl-for-login-cve-2017-11706/ | Third Party Advisory |
https://hackerone.com/reports/166712 | Third Party Advisory |
Configurations
Information
Published : 2017-07-27 22:29
Updated : 2017-08-15 10:43
NVD link : CVE-2017-11706
Mitre link : CVE-2017-11706
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
boozt
- boozt