AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html | exploit mailing list |
http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt | exploit |