lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 18 Aug 2022 09:55:31 +0000
From: Stefan Pietsch <s.pietsch@...vent.io>
To: Packet Storm <submissions@...ketstormsecurity.com>,
 Full Disclosure <fulldisclosure@...lists.org>
Subject: [FD] Trovent Security Advisory 2110-01 / Insecure data storage in
	Polar Flow Android application

# Trovent Security Advisory 2110-01 #
#####################################


Insecure data storage in Polar Flow Android application
#######################################################


Overview
########

Advisory ID: TRSA-2110-01
Advisory version: 1.0
Advisory status: Public
Advisory URL: https://trovent.io/security-advisory-2110-01
Affected product: Polar Flow Android mobile application (fi.polar.polarflow)
Affected version: 5.7.1
Vendor: Polar Electro, https://flow.polar.com
Credits: Trovent Security GmbH, Karima Hebbal


Detailed description
####################

The Polar Flow app is a sports, fitness and activity analyzer which allows to plan
and monitor training, daily activity and sleep.
Trovent Security GmbH discovered that the application stores the username and
password in clear text in a file on the mobile device.

Severity: Medium
CVSS Score: 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)
CVE ID: N/A
CWE ID: CWE-312


Proof of concept
################

Content of the file /data/data/fi.polar.polarflow/shared_prefs/UserData3.xml:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<?xml version='1.0' encoding='utf-8' standalone='yes' ?>
<map>
    <string name="current_device_id">no_device</string>
    <int name="last_version_code" value="5070103" />
    <string name="base_url">https://www.polarremote.com/v2/users/54871065</string>
    <string name="last_name">Ptest</string>
    <int name="key_initial_view_resource_id" value="2131363187" />
    <boolean name="valid_ver_two" value="true" />
    <long name="problem_phone_message_time" value="1634888249727" />
    <boolean name="new_blogs_available" value="true" />
    <string name="address_json">{&quot;city&quot;:&quot;\u003cscript\u003ealert(1)\u003c/script\
u003e&quot;,&quot;countryCode&quot;:&quot;DE&quot;,&quot;modified&quot;:&quot;2021-10-22T07:37:5
3.000Z&quot;}</string>
    <string name="profile_json">{&quot;favoriteSports&quot;:[]}</string>
    <string name="password">Test2021</string>
    <string name="last_blog_sync_time">2021-10-22T09:37:18.309</string>
    <long name="user_id" value="54871065" />
    <boolean name="initial_remote_sync_executed" value="true" />
    <string name="preferred_blog_language">en</string>
    <int name="key_training_diary_tab" value="0" />
    <string name="first_name">Ptest</string>
    <int name="should_show_problem_phone_message" value="2" />
    <string name="username">ptesttest11@...il.com</string>
</map>

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Solution / Workaround
#####################

We recommend not to store sensitive information in clear text on the mobile
device.

Fixed in version 6.3.0, verified by Trovent.


History
#######

2021-10-18: Vulnerability found
2021-12-15: Vendor contacted
2022-01-20: Contacted vendor again
2022-01-21: Vendor replied that the vulnerability will be checked
2022-01-28: Vendor replied, the vulnerability will be fixed in a future update
2022-07-27: Vendor contacted, asking for status
2022-08-09: Vendor replied, the vulnerability is fixed since version 6.3.0
2022-08-17: Trovent verified remediation of the vulnerability
2022-08-18: Advisory published

Download attachment "signature.asc" of type "application/pgp-signature" (856 bytes)

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists