VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://veryfitpro.com | url repurposed third party advisory not applicable |
http://www.i-doo.cn | not applicable |
https://github.com/martinfrancois/CVE-2021-36460 | mitigation third party advisory exploit |