CVE-2020-12624

The League application before 2020-05-02 on Android sends a bearer token in an HTTP Authorization header to an arbitrary web site that hosts an external image because an OkHttp object is reused, which allows remote attackers to hijack sessions.
References
Link Resource
https://push32.com/post/dating-app-fail/ Exploit Third Party Advisory
https://push32.com/post/dating-app-fail/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:theleague:the_league:*:*:*:*:*:android:*:*

History

21 Nov 2024, 04:59

Type Values Removed Values Added
References () https://push32.com/post/dating-app-fail/ - Exploit, Third Party Advisory () https://push32.com/post/dating-app-fail/ - Exploit, Third Party Advisory

Information

Published : 2020-05-03 13:15

Updated : 2024-11-21 04:59


NVD link : CVE-2020-12624

Mitre link : CVE-2020-12624

CVE.ORG link : CVE-2020-12624


JSON object : View

Products Affected

theleague

  • the_league
CWE
CWE-459

Incomplete Cleanup