Published:2024/05/10  Last Updated:2024/05/10

JVN#83405304
"OfferBox" App uses a hard-coded secret key

Overview

"OfferBox" App provided by i-plug inc. uses a hard-coded secret key.

Products Affected

  • "OfferBox" App for Android 2.0.0 to 2.3.17
  • "OfferBox" App for iOS 2.1.7 to 2.6.14

Description

"OfferBox" App provided by i-plug inc. uses a hard-coded secret key for JWT (CWE-321).

Impact

The hard-coded secret key for JWT may be retrieved if the application binary is reverse-engineered.

Solution

The hard-coded secret key has been revoked by the developer on May 8, 2024 therefore this vulnerability is not exploitable.
The developer has released the following updates which do not contain hard-coded secret keys:

  • "OfferBox" App for Android 3.0.0
  • "OfferBox" App for iOS 3.0.0

Vendor Status

Vendor Status Last Update Vendor Notes
i-plug inc. Vulnerable 2024/05/10

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score: 4.0
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Yuta Yamate of Rakuten Group, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-32988
JVN iPedia JVNDB-2024-000045