CVE-2019-13098

The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
References
Link Resource
https://pastebin.com/a5VhaxYn Exploit Third Party Advisory
https://pastebin.com/raw/rVGbwSw0 Exploit Third Party Advisory
https://pastebin.com/a5VhaxYn Exploit Third Party Advisory
https://pastebin.com/raw/rVGbwSw0 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:tronlink:wallet:2.2.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:24

Type Values Removed Values Added
References () https://pastebin.com/a5VhaxYn - Exploit, Third Party Advisory () https://pastebin.com/a5VhaxYn - Exploit, Third Party Advisory
References () https://pastebin.com/raw/rVGbwSw0 - Exploit, Third Party Advisory () https://pastebin.com/raw/rVGbwSw0 - Exploit, Third Party Advisory

Information

Published : 2019-07-22 16:15

Updated : 2024-11-21 04:24


NVD link : CVE-2019-13098

Mitre link : CVE-2019-13098

CVE.ORG link : CVE-2019-13098


JSON object : View

Products Affected

tronlink

  • wallet

google

  • android
CWE
CWE-532

Insertion of Sensitive Information into Log File