CVE-2021-36460

VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link Resource
http://veryfitpro.com Not Applicable Third Party Advisory
https://github.com/martinfrancois/CVE-2021-36460 Exploit Mitigation Third Party Advisory
http://www.i-doo.cn Not Applicable
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*
cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*

Information

Published : 2022-04-25 06:15

Updated : 2022-05-05 06:46


NVD link : CVE-2021-36460

Mitre link : CVE-2021-36460


JSON object : View

CWE
CWE-312

Cleartext Storage of Sensitive Information

Advertisement

dedicated server usa

Products Affected

veryfitpro_project

  • veryfitpro