Description
The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-7469 | The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account. |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T01:36:27.302Z
Reserved: 2016-08-03T00:00:00.000Z
Link: CVE-2016-6548
No data.
Status : Modified
Published: 2018-07-13T20:29:00.503
Modified: 2024-11-21T02:56:20.010
Link: CVE-2016-6548
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD