The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
References
Link | Resource |
---|---|
https://pastebin.com/a5VhaxYn | Exploit Third Party Advisory |
https://pastebin.com/raw/rVGbwSw0 | Exploit Third Party Advisory |
https://pastebin.com/a5VhaxYn | Exploit Third Party Advisory |
https://pastebin.com/raw/rVGbwSw0 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://pastebin.com/a5VhaxYn - Exploit, Third Party Advisory | |
References | () https://pastebin.com/raw/rVGbwSw0 - Exploit, Third Party Advisory |
Information
Published : 2019-07-22 16:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13098
Mitre link : CVE-2019-13098
CVE.ORG link : CVE-2019-13098
JSON object : View
Products Affected
tronlink
- wallet
- android
CWE
CWE-532
Insertion of Sensitive Information into Log File