Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN41566067/index.html | Third Party Advisory VDB Entry |
https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998 | Product Release Notes |
https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en | Product |
http://jvn.jp/en/jp/JVN41566067/index.html | Third Party Advisory VDB Entry |
https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998 | Product Release Notes |
https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en | Product |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN41566067/index.html - Third Party Advisory, VDB Entry | |
References | () https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998 - Product, Release Notes | |
References | () https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en - Product |
Information
Published : 2019-12-26 16:15
Updated : 2024-11-21 04:45
NVD link : CVE-2019-6024
Mitre link : CVE-2019-6024
CVE.ORG link : CVE-2019-6024
JSON object : View
Products Affected
rakuten
- rakuma
CWE
CWE-522
Insufficiently Protected Credentials