Amazon AWS SDK <=2.8.5 for Android uses Android SharedPreferences to store plain text AWS STS Temporary Credentials retrieved by AWS Cognito Identity Service. An attacker can use these credentials to create authenticated and/or authorized requests. Note that the attacker must have "root" privilege access to the Android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing Android's fundamental security mechanisms).
References
Configurations
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://aws-amplify.github.io/aws-sdk-android/docs/reference/com/amazonaws/auth/CognitoCachingCredentialsProvider.html - Exploit, Third Party Advisory | |
References | () https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_01.png - Exploit, Third Party Advisory | |
References | () https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_02.png - Exploit, Third Party Advisory | |
References | () https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_03.png - Exploit, Third Party Advisory |
Information
Published : 2019-04-04 15:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19981
Mitre link : CVE-2018-19981
CVE.ORG link : CVE-2018-19981
JSON object : View
Products Affected
amazon
- aws_software_development_kit
CWE
CWE-312
Cleartext Storage of Sensitive Information