The login implementation in AirDroid 1.0.4 beta allows remote attackers to bypass a multiple-login protection mechanism by modifying a pass value within JSON data.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html | mailing list exploit |
http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt | exploit |