In the "NQ Contacts Backup & Restore" application 1.1 for Android, no HTTPS is used for transmitting login and synced user data. When logging in, the username is transmitted in cleartext along with an SHA-1 hash of the password. The attacker can either crack this hash or use it for further attacks where only the hash value is required.
References
Link | Resource |
---|---|
https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html | Third Party Advisory |
Configurations
Information
Published : 2017-10-29 10:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-15999
Mitre link : CVE-2017-15999
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
nq
- contacts_backup_\&_restore