The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ | Exploit Third Party Advisory | 
| https://www.kb.cert.org/vuls/id/402847 | Third Party Advisory US Government Resource | 
| https://www.securityfocus.com/bid/93877 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2018-07-13 20:29
Updated : 2019-10-09 23:19
NVD link : CVE-2016-6548
Mitre link : CVE-2016-6548
CVE.ORG link : CVE-2016-6548
JSON object : View
Products Affected
                nutspace
- nut_mobile
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
