128 lines
4.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-36460",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-25T13:15:49.330",
"lastModified": "2022-05-05T13:46:55.707",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless."
},
{
"lang": "es",
"value": "VeryFitPro (com.veryfit2hr.second) versi\u00f3n 3.2.8, cifra la contrase\u00f1a de la cuenta localmente en el dispositivo y usa el hash para autenticar en toda la comunicaci\u00f3n con la API del backend, incluyendo el inicio de sesi\u00f3n, el registro y el cambio de contrase\u00f1as. Esto permite a un atacante en posesi\u00f3n del hash tomar el control de la cuenta de un usuario, haciendo in\u00fatiles las ventajas de almacenar las contrase\u00f1as con hash en la base de datos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*",
"versionEndIncluding": "3.3.7",
"matchCriteriaId": "C0FAAA0B-DCD4-44BA-8159-0FF7BFC5A670"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*",
"versionEndIncluding": "3.3.7",
"matchCriteriaId": "7CB1B977-9AD4-40EC-8B44-91D4CDF59436"
}
]
}
]
}
],
"references": [
{
"url": "http://veryfitpro.com",
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Third Party Advisory"
]
},
{
"url": "http://www.i-doo.cn",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/martinfrancois/CVE-2021-36460",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}