Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f965-7gr5-p9j3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.

Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.

EPSS

Процентиль: 54%
0.00316
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-312

Связанные уязвимости

CVSS3: 5.9
nvd
почти 5 лет назад

Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.

EPSS

Процентиль: 54%
0.00316
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-312