Vulnerability CVE-2017-9045


Published: 2017-05-18

Description:
The Google I/O 2017 application before 5.1.4 for Android downloads multiple .json files from http://storage.googleapis.com without SSL, which makes it easier for man-in-the-middle attackers to spoof Feed and Schedule data by creating a modified blocks_v4.json file.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Google I/O 2017 Android Man-In-The-Middle
Yakov Shafranovi...
20.05.2017

Type:

CWE-311

(Missing Encryption of Sensitive Data)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Google -> Google i/o 2017 

 References:
http://www.securityfocus.com/bid/98549
https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-google-io-2017-android-app/

Copyright 2024, cxsecurity.com

 

Back to Top