René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

184 lines
7.3 KiB
JSON

{
"id": "CVE-2016-4839",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2017-05-12T18:29:00.233",
"lastModified": "2021-05-12T16:24:29.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Android Apps Money Forward (prior to v7.18.0), Money Forward for The Gunma Bank (prior to v1.2.0), Money Forward for SHIGA BANK (prior to v1.2.0), Money Forward for SHIZUOKA BANK (prior to v1.4.0), Money Forward for SBI Sumishin Net Bank (prior to v1.6.0), Money Forward for Tokai Tokyo Securities (prior to v1.4.0), Money Forward for THE TOHO BANK (prior to v1.3.0), Money Forward for YMFG (prior to v1.5.0) provided by Money Forward, Inc. and Money Forward for AppPass (prior to v7.18.3), Money Forward for au SMARTPASS (prior to v7.18.0), Money Forward for Chou Houdai (prior to v7.18.3) provided by SOURCENEXT CORPORATION do not properly implement the WebView class, which allows an attacker to disclose information stored on the device via a specially crafted application."
},
{
"lang": "es",
"value": "Las Apps de Android Money Forward (anteriores a la v7.18.0), Money Forward para Gunma Bank (anteriores a la v1.2.0), Money Forward para SHIGA BANK (anteriores a la v1.2.0), Money Forward para SHIZUOKA BANK (anteriores a la v1.4.0), Money Forward para SBI Sumishin Net Bank (anteriores a la v1.6.0), Money Forward pra Tokai Tokyo Securities (anteriores a la v1.4.0), Money Forward para THE TOHO BANK (anteriores a la v1.3.0), Money Forward para YMFG (anteriores a la v1.5.0) proporcionada por Money Forward, Inc. y Money Forward para AppPass (anteriores a la v7.18.3), Money Forward para au SMARTPASS (anteriores a la v7.18.0), Money Forward para Chou Houdai (anteriores a la v7.18.3) proporcionada por SOURCENEXT CORPORATION no implementan correctamente la clase WebView, lo que permite a un atacante revelar informaci\u00f3n almacenada en el dispositivo a trav\u00e9s de una aplicaci\u00f3n especialmente manipulada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_apppass:*:*:*:*:*:android:*:*",
"versionEndExcluding": "7.18.3",
"matchCriteriaId": "83FADA68-143E-4C45-8779-6AEC146AE1D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_au_smartpass:*:*:*:*:*:android:*:*",
"versionEndExcluding": "7.18.0",
"matchCriteriaId": "4CEF1CE6-342D-42A5-A021-F705036C083E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_chou_houdai:*:*:*:*:*:android:*:*",
"versionEndExcluding": "7.18.3",
"matchCriteriaId": "26E2602A-89AC-4AA4-8081-A091EC4ACDD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_sbi_sumishin_net_bank:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.6.0",
"matchCriteriaId": "1A4FECCD-9F04-47A4-9390-97373D7762C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_shiga_bank:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.2.0",
"matchCriteriaId": "283B2CE2-A1FD-41CE-904A-AA1E39B5E4BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_shizuoka_bank:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "250435CC-B732-45FC-BD24-258C94F70DCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_the_gunma_bank:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.2.0",
"matchCriteriaId": "89B4F529-A40F-428B-8693-EB3B8DCC91AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_the_toho_bank:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "81579A14-9065-4005-8A21-0BAF609F270D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_tokai_tokyo_securities:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.4.0",
"matchCriteriaId": "D054BF25-422B-4F23-9003-C4E653308BE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moneyforward:money_forward_for_ymfg:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.5.0",
"matchCriteriaId": "9982DA7F-E4EF-48FC-9F26-EE5EC0C267BA"
}
]
}
]
}
],
"references": [
{
"url": "http://corp.moneyforward.com/info/20160920-mf-android/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/93035",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.sourcenext.com/support/i/160725_1",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://jvn.jp/en/jp/JVN61297210/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}