An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. The logout mechanism does not check for authorization. Therefore, an attacker only needs to know the device ID. This causes a denial of service. This might be interpreted as a vulnerability in customer-controlled software, in the sense that the StashCat client side has no secure way to signal that it is ending a session and that data should be deleted.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Jul/90 Mailing List Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-08-01T14:00:00

Updated: 2017-08-01T14:57:01

Reserved: 2017-07-09T00:00:00


Link: CVE-2017-11135

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-08-01T14:29:00.577

Modified: 2019-10-03T00:03:26.223


Link: CVE-2017-11135

JSON object: View

cve-icon Redhat Information

No data.

CWE