The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Jun/45 | Exploit Mailing List Third Party Advisory |
https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US | Product |
https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2105-01 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-06-16 12:15
Updated : 2021-07-12 16:57
NVD link : CVE-2021-32612
Mitre link : CVE-2021-32612
CVE.ORG link : CVE-2021-32612
JSON object : View
Products Affected
i-doo
- veryfitpro
CWE
CWE-319
Cleartext Transmission of Sensitive Information