Description
Retty App for Android versions prior to 4.8.13 and Retty App for iOS versions prior to 4.11.14 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Related CPE's
a
retty
retty
2
References
https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view
Third Party Advisory
https://jvn.jp/en/jp/JVN26891339/index.html
Third Party Advisory
https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view
Third Party Advisory
https://jvn.jp/en/jp/JVN26891339/index.html
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-07-14T00:15:07.480Z
4 years agoLast modified
2024-11-21T04:47:07.480Z
1 year ago