CVE-2019-6024

Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:android:*:*
cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN41566067/index.html - Third Party Advisory, VDB Entry () http://jvn.jp/en/jp/JVN41566067/index.html - Third Party Advisory, VDB Entry
References () https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998 - Product, Release Notes () https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998 - Product, Release Notes
References () https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en - Product () https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en - Product

Information

Published : 2019-12-26 16:15

Updated : 2024-11-21 04:45


NVD link : CVE-2019-6024

Mitre link : CVE-2019-6024

CVE.ORG link : CVE-2019-6024


JSON object : View

Products Affected

rakuten

  • rakuma
CWE
CWE-522

Insufficiently Protected Credentials