CVE-2021-36460

VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link Resource
http://veryfitpro.com Not Applicable Third Party Advisory URL Repurposed
http://www.i-doo.cn Not Applicable
https://github.com/martinfrancois/CVE-2021-36460 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*
cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://veryfitpro.comĀ - Not Applicable, Third Party Advisory (MISC) http://veryfitpro.comĀ - Not Applicable, Third Party Advisory, URL Repurposed

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-312 CWE-287

Information

Published : 2022-04-25 13:15

Updated : 2024-02-28 19:09


NVD link : CVE-2021-36460

Mitre link : CVE-2021-36460

CVE.ORG link : CVE-2021-36460


JSON object : View

Products Affected

veryfitpro_project

  • veryfitpro
CWE
CWE-287

Improper Authentication