LINE@ for Android version 1.0.0 and LINE@ for iOS version 1.0.0 are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.
References
Link | Resource |
---|---|
http://official-blog.line.me/ja/archives/36495925.html | Vendor Advisory |
https://jvn.jp/en/jp/JVN22546110/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Nov 2023, 16:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-924 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | (MISC) https://jvn.jp/en/jp/JVN22546110/ - Third Party Advisory | |
References | (MISC) http://official-blog.line.me/ja/archives/36495925.html - Vendor Advisory | |
CPE | cpe:2.3:a:line:line\@:1.0.0:*:*:*:*:android:*:* cpe:2.3:a:line:line\@:1.0.0:*:*:*:*:iphone_os:*:* |
|
First Time |
Line
Line line\@ |
31 Oct 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-31 10:15
Updated : 2024-02-28 20:33
NVD link : CVE-2015-2968
Mitre link : CVE-2015-2968
CVE.ORG link : CVE-2015-2968
JSON object : View
Products Affected
line
- line\@
CWE
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel