VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link | Resource |
---|---|
http://veryfitpro.com | Not Applicable Third Party Advisory URL Repurposed |
http://www.i-doo.cn | Not Applicable |
https://github.com/martinfrancois/CVE-2021-36460 | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-04-25 13:15
Updated : 2024-02-14 01:17
NVD link : CVE-2021-36460
Mitre link : CVE-2021-36460
CVE.ORG link : CVE-2021-36460
JSON object : View
Products Affected
veryfitpro_project
- veryfitpro
CWE
CWE-287
Improper Authentication