CVE-2017-15999

In the "NQ Contacts Backup & Restore" application 1.1 for Android, no HTTPS is used for transmitting login and synced user data. When logging in, the username is transmitted in cleartext along with an SHA-1 hash of the password. The attacker can either crack this hash or use it for further attacks where only the hash value is required.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nq:contacts_backup_\&_restore:1.1:*:*:*:*:android:*:*

History

21 Nov 2024, 03:15

Type Values Removed Values Added
References () https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html - Third Party Advisory () https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html - Third Party Advisory

Information

Published : 2017-10-29 17:29

Updated : 2024-11-21 03:15


NVD link : CVE-2017-15999

Mitre link : CVE-2017-15999

CVE.ORG link : CVE-2017-15999


JSON object : View

Products Affected

nq

  • contacts_backup_\&_restore
CWE
CWE-319

Cleartext Transmission of Sensitive Information