cve/2022/CVE-2022-41209.md

19 lines
912 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-41209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41209)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Customer%20Data%20Cloud%20(Gigya)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-326&color=brighgreen)
### Description
SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses encryption method which lacks proper diffusion and does not hide the patterns well. This can lead to information disclosure. In certain scenarios, application might also be susceptible to replay attacks.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-06-09 00:33:16 +00:00
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.