The NTT Broadband Platform Japan Connected-free Wi-Fi application 1.6.0 and earlier for Android and 1.0.2 and earlier for iOS allows attackers to bypass a URL whitelist protection mechanism and obtain API access via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN04644117/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000115 | Vendor Advisory |
https://itunes.apple.com/en/app/japan-connected-free-wi-fi/id810838196?mt=8 | Patch |
https://play.google.com/store/apps/details?id=com.nttbp.jfw | Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-09-11 21:59
Updated : 2024-02-04 18:53
NVD link : CVE-2015-5629
Mitre link : CVE-2015-5629
CVE.ORG link : CVE-2015-5629
JSON object : View
Products Affected
ntt-bp
- japan_connected-free_wi-fi
CWE
CWE-264
Permissions, Privileges, and Access Controls