signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
References
Link | Resource |
---|---|
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 | Third Party Advisory |
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 | Third Party Advisory |
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 | Third Party Advisory |
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 | Third Party Advisory |
https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.9 |
References | () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 - Third Party Advisory | |
References | () http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 - Third Party Advisory | |
References | () https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380 - Third Party Advisory |
Information
Published : 2020-05-07 23:15
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1423
Mitre link : CVE-2014-1423
CVE.ORG link : CVE-2014-1423
JSON object : View
Products Affected
ubports
- ubuntu_touch
signond_project
- signond
CWE
CWE-522
Insufficiently Protected Credentials