CVE-2021-36460

VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
References
Link Resource
http://veryfitpro.com Not Applicable Third Party Advisory
https://github.com/martinfrancois/CVE-2021-36460 Exploit Mitigation
http://www.i-doo.cn Not Applicable
Configurations

Configuration 1

cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*
cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*

Information

Published : 2022-04-25 01:15

Updated : 2022-05-05 01:46


NVD link : CVE-2021-36460

Mitre link : CVE-2021-36460

Products Affected
No products.
CWE
CWE-312

Cleartext Storage of Sensitive Information