Description
VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
Related CPE's
a
veryfitpro_project
veryfitpro
2
References
Not ApplicableThird Party AdvisoryURL Repurposed
Not Applicable
https://github.com/martinfrancois/CVE-2021-36460
ExploitMitigationThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-04-25T13:15:49.330
3 years agoLast modified
2024-02-14T01:17:43.863
1 year ago