Описание
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.22 (включая)
cpe:2.3:a:onepeloton:peloton:*:*:*:*:*:android:*:*
EPSS
Процентиль: 36%
0.00154
Низкий
8.6 High
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-312
Связанные уязвимости
github
больше 3 лет назад
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
EPSS
Процентиль: 36%
0.00154
Низкий
8.6 High
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-312