Vulnerability CVE-2014-1423


Published: 2020-05-07   Modified: 2020-05-08

Description:
signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.

Type:

CWE-522

(Insufficiently Protected Credentials)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Ubports -> Ubuntu touch 
Signond project -> Signond 

 References:
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644
http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645
https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380

Copyright 2024, cxsecurity.com

 

Back to Top