The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing.
References
Link | Resource |
---|---|
https://trovent.io/security-advisory-2105-01 | Exploit Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US | Product |
http://seclists.org/fulldisclosure/2021/Jun/45 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-06-16 05:15
Updated : 2021-07-12 09:57
NVD link : CVE-2021-32612
Mitre link : CVE-2021-32612
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
i-doo
- veryfitpro