The Starbucks 2.6.1 application for iOS stores sensitive information in plaintext in the Crashlytics log file (/Library/Caches/com.crashlytics.data/com.starbucks.mystarbucks/session.clslog), which allows attackers to discover usernames, passwords, and e-mail addresses via an application that reads session.clslog.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Jan/123 - | |
References | () http://seclists.org/fulldisclosure/2014/Jan/64 - | |
References | () http://www.osvdb.org/102514 - | |
References | () http://www.securityfocus.com/archive/1/530756/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/64942 - | |
References | () http://www.zdnet.com/starbucks-fixes-ios-app-bugs-7000025323/ - | |
References | () http://www.zdnet.com/the-starbucks-bug-not-as-awful-as-reported-7000025269/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90412 - | |
References | () https://itunes.apple.com/us/app/starbucks/id331177714?mt=8 - |
Information
Published : 2014-01-28 00:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0647
Mitre link : CVE-2014-0647
CVE.ORG link : CVE-2014-0647
JSON object : View
Products Affected
starbucks
- starbucks
apple
- iphone_os
CWE
CWE-255
Credentials Management Errors