An issue was discovered in the stashcat app through 3.9.2 for macOS, Windows, Android, iOS, and possibly other platforms. It stores the client_key, the device_id, and the public key for end-to-end encryption in cleartext, enabling an attacker (by copying or having access to the local storage database file) to login to the system from any other computer, and get unlimited access to all data in the users's context.
References
Link | Resource |
---|---|
http://www.jvanlaak.de/stashcat.html | Third Party Advisory |
http://www.jvanlaak.de/stashcat_CWE_312_200527.pdf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-06-17T16:34:30
Updated: 2020-06-17T16:34:30
Reserved: 2020-05-27T00:00:00
Link: CVE-2020-13637
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-17T17:15:10.550
Modified: 2021-07-20T13:00:39.083
Link: CVE-2020-13637
JSON object: View
Redhat Information
No data.
CWE