CVE-2021-36460

VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link Resource
http://veryfitpro.com Not Applicable Third Party Advisory URL Repurposed
http://www.i-doo.cn Not Applicable
https://github.com/martinfrancois/CVE-2021-36460 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*
cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*

History

No history.

Information

Published : 2022-04-25 13:15

Updated : 2024-02-14 01:17


NVD link : CVE-2021-36460

Mitre link : CVE-2021-36460

CVE.ORG link : CVE-2021-36460


JSON object : View

Products Affected

veryfitpro_project

  • veryfitpro
CWE
CWE-287

Improper Authentication