VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link | Resource |
---|---|
http://veryfitpro.com | Not Applicable Third Party Advisory |
https://github.com/martinfrancois/CVE-2021-36460 | Exploit Mitigation Third Party Advisory |
http://www.i-doo.cn | Not Applicable |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-04-25 06:15
Updated : 2022-05-05 06:46
NVD link : CVE-2021-36460
Mitre link : CVE-2021-36460
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
veryfitpro_project
- veryfitpro