The NTT Broadband Platform Japan Connected-free Wi-Fi application 1.6.0 and earlier for Android and 1.0.2 and earlier for iOS allows attackers to bypass a URL whitelist protection mechanism and obtain API access via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN04644117/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000115 - Vendor Advisory | |
References | () https://itunes.apple.com/en/app/japan-connected-free-wi-fi/id810838196?mt=8 - Patch | |
References | () https://play.google.com/store/apps/details?id=com.nttbp.jfw - Patch |
Information
Published : 2015-09-11 21:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5629
Mitre link : CVE-2015-5629
CVE.ORG link : CVE-2015-5629
JSON object : View
Products Affected
ntt-bp
- japan_connected-free_wi-fi
CWE
CWE-264
Permissions, Privileges, and Access Controls