JVN#32739265
"NewsPicks" App uses a hard-coded API key for an external service
Overview
"NewsPicks" App uses a hard-coded API key for an external service.
Products Affected
- "NewsPicks" App for Android versions 10.4.5 and earlier
- "NewsPicks" App for iOS versions 10.4.2 and earlier
Description
"NewsPicks" App for Android and "NewsPicks" App for iOS provided by NewsPicks, Inc. use a hard-coded API key for an external service (CWE-798).
Impact
Data in the app may be analyzed and API key for an external service may be obtained.
Note that the users of the app are not directly affected by this vulnerability.
Solution
Update the Application
Update the application to the latest version according to the information provided by the developer.
According to the developer, the latest app does not hard-code the API key.
Also the vulnerable API key has been deactivated, and therefore the information contained in the vulnerable app cannot be abused.
Vendor Status
Vendor | Link |
NewsPicks, Inc. | "NewsPicks" App for Android (Text in Japanese) |
"NewsPicks" App for iOS (Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Sunagawa Masanori of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2023-28387 |
JVN iPedia |
JVNDB-2023-000068 |