An issue was discovered in the stashcat app through 3.9.2 for macOS, Windows, Android, iOS, and possibly other platforms. It stores the client_key, the device_id, and the public key for end-to-end encryption in cleartext, enabling an attacker (by copying or having access to the local storage database file) to login to the system from any other computer, and get unlimited access to all data in the users's context.
References
Link | Resource |
---|---|
http://www.jvanlaak.de/stashcat_CWE_312_200527.pdf | Third Party Advisory |
http://www.jvanlaak.de/stashcat.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-17 10:15
Updated : 2021-07-20 06:00
NVD link : CVE-2020-13637
Mitre link : CVE-2020-13637
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
heinekingmedia
- stashcat