Description
Jimoty App for Android versions prior to 3.7.42 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15344 | Jimoty App for Android versions prior to 3.7.42 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. |
References
| Link | Providers |
|---|---|
| https://jvn.jp/en/jp/JVN49047921/index.html |
|
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-02T23:18:41.732Z
Reserved: 2022-01-06T00:00:00.000Z
Link: CVE-2022-0131
No data.
Status : Modified
Published: 2022-01-17T10:15:08.007
Modified: 2024-11-21T06:37:58.033
Link: CVE-2022-0131
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD