CVE-2014-1423

signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:signond_project:signond:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ubports:ubuntu_touch:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 5.9
References () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 - Third Party Advisory () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 - Third Party Advisory
References () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 - Third Party Advisory () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 - Third Party Advisory
References () https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 - Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 - Third Party Advisory

Information

Published : 2020-05-07 23:15

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1423

Mitre link : CVE-2014-1423

CVE.ORG link : CVE-2014-1423


JSON object : View

Products Affected

ubports

  • ubuntu_touch

signond_project

  • signond
CWE
CWE-522

Insufficiently Protected Credentials