The League application before 2020-05-02 on Android sends a bearer token in an HTTP Authorization header to an arbitrary web site that hosts an external image because an OkHttp object is reused, which allows remote attackers to hijack sessions.
References
Link | Resource |
---|---|
https://push32.com/post/dating-app-fail/ | Exploit Third Party Advisory |
https://push32.com/post/dating-app-fail/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://push32.com/post/dating-app-fail/ - Exploit, Third Party Advisory |
Information
Published : 2020-05-03 13:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12624
Mitre link : CVE-2020-12624
CVE.ORG link : CVE-2020-12624
JSON object : View
Products Affected
theleague
- the_league
CWE
CWE-459
Incomplete Cleanup