The Yodobashi App for Android 1.2.1.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN29053368/index.html | Third Party Advisory VDB Entry |
http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000111.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/76266 | Third Party Advisory VDB Entry |
http://jvn.jp/en/jp/JVN29053368/index.html | Third Party Advisory VDB Entry |
http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000111.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/76266 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN29053368/index.html - Third Party Advisory, VDB Entry | |
References | () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000111.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/76266 - Third Party Advisory, VDB Entry |
Information
Published : 2018-01-12 17:29
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2981
Mitre link : CVE-2015-2981
CVE.ORG link : CVE-2015-2981
JSON object : View
Products Affected
yodobashi
- yodobashi
CWE
CWE-295
Improper Certificate Validation