Description


Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.

Related CPE's


a

timelybills

timelybills

2

Weaknesses



CWE-459

CVSS impact metrics


CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.9 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-04-06T14:15:16.457Z

4 years ago

Last modified

2024-11-21T04:56:52.827Z

1 year ago