CVE-2019-13098

The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
References
Link Resource
https://pastebin.com/raw/rVGbwSw0 Exploit Third Party Advisory
https://pastebin.com/a5VhaxYn Exploit Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:tronlink:wallet:2.2.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

Information

Published : 2019-07-22 09:15

Updated : 2019-07-24 08:03


NVD link : CVE-2019-13098

Mitre link : CVE-2019-13098


JSON object : View

CWE
CWE-532

Insertion of Sensitive Information into Log File

Advertisement

dedicated server usa

Products Affected

google

  • android

tronlink

  • wallet