Description
The League application before 2020-05-02 on Android sends a bearer token in an HTTP Authorization header to an arbitrary web site that hosts an external image because an OkHttp object is reused, which allows remote attackers to hijack sessions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4925 | The League application before 2020-05-02 on Android sends a bearer token in an HTTP Authorization header to an arbitrary web site that hosts an external image because an OkHttp object is reused, which allows remote attackers to hijack sessions. |
References
| Link | Providers |
|---|---|
| https://push32.com/post/dating-app-fail/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:04:22.161Z
Reserved: 2020-05-03T00:00:00.000Z
Link: CVE-2020-12624
No data.
Status : Modified
Published: 2020-05-03T13:15:11.310
Modified: 2024-11-21T04:59:56.397
Link: CVE-2020-12624
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD