In the "NQ Contacts Backup & Restore" application 1.1 for Android, no HTTPS is used for transmitting login and synced user data. When logging in, the username is transmitted in cleartext along with an SHA-1 hash of the password. The attacker can either crack this hash or use it for further attacks where only the hash value is required.
References
Link | Resource |
---|---|
https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html | Third Party Advisory |
https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html - Third Party Advisory |
Information
Published : 2017-10-29 17:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15999
Mitre link : CVE-2017-15999
CVE.ORG link : CVE-2017-15999
JSON object : View
Products Affected
nq
- contacts_backup_\&_restore
CWE
CWE-319
Cleartext Transmission of Sensitive Information