Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as personal contacts.
Solution:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product writes sensitive information to a log file.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-6922-4a37a-1.html | third party advisory |