In the "NQ Contacts Backup & Restore" application 1.1 for Android, no HTTPS is used for transmitting login and synced user data. When logging in, the username is transmitted in cleartext along with an SHA-1 hash of the password. The attacker can either crack this hash or use it for further attacks where only the hash value is required.
References
Link | Resource |
---|---|
https://1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:23:34
Updated: 2022-10-03T16:23:34
Reserved: 2022-10-03T00:00:00
Link: CVE-2017-15999
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-29T17:29:00.313
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-15999
JSON object: View
Redhat Information
No data.
CWE