The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Jun/45 | Exploit Mailing List Third Party Advisory |
https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US | Product |
https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2105-01 | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Jun/45 | Exploit Mailing List Third Party Advisory |
https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US | Product |
https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2105-01 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2021/Jun/45 - Exploit, Mailing List, Third Party Advisory | |
References | () https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US - Product | |
References | () https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt - Exploit, Third Party Advisory | |
References | () https://trovent.io/security-advisory-2105-01 - Exploit, Third Party Advisory |
Information
Published : 2021-06-16 12:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32612
Mitre link : CVE-2021-32612
CVE.ORG link : CVE-2021-32612
JSON object : View
Products Affected
i-doo
- veryfitpro
CWE
CWE-319
Cleartext Transmission of Sensitive Information