Published:2024/05/10 Last Updated:2024/05/10
JVN#83405304
"OfferBox" App uses a hard-coded secret key
Overview
"OfferBox" App provided by i-plug inc. uses a hard-coded secret key.
Products Affected
- "OfferBox" App for Android 2.0.0 to 2.3.17
- "OfferBox" App for iOS 2.1.7 to 2.6.14
Description
"OfferBox" App provided by i-plug inc. uses a hard-coded secret key for JWT (CWE-321).
Impact
The hard-coded secret key for JWT may be retrieved if the application binary is reverse-engineered.
Solution
The hard-coded secret key has been revoked by the developer on May 8, 2024 therefore this vulnerability is not exploitable.
The developer has released the following updates which do not contain hard-coded secret keys:
- "OfferBox" App for Android 3.0.0
- "OfferBox" App for iOS 3.0.0
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score:
4.0
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Yuta Yamate of Rakuten Group, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-32988 |
JVN iPedia |
JVNDB-2024-000045 |