Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:oklok_project:oklok:3.1.1:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BD4A4E73-78DE-4A92-B729-F425AF47CDEB", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) has an information-exposure issue. In the mobile app, an attempt to add an already-bound lock by its barcode reveals the email address of the account to which the lock is bound, as well as the name of the lock. Valid barcode inputs can be easily guessed because barcode strings follow a predictable pattern. Correctly guessed valid barcode inputs entered through the app interface disclose arbitrary users' email addresses and lock names."}, {"lang": "es", "value": "La aplicaci\u00f3n m\u00f3vil OKLOK (versi\u00f3n 3.1.1) para el Fingerprint Bluetooth Padlock FB50 (versi\u00f3n 2.3), tiene un problema de exposici\u00f3n de informaci\u00f3n. En la aplicaci\u00f3n para m\u00f3viles, un intento de a\u00f1adir un candado ya vinculado por su c\u00f3digo de barras revela la direcci\u00f3n de correo electr\u00f3nico de la cuenta a la que est\u00e1 vinculado el candado, as\u00ed como el nombre del mismo. Las entradas v\u00e1lidas del c\u00f3digo de barras pueden adivinarse f\u00e1cilmente porque las cadenas del c\u00f3digo de barras siguen a un patr\u00f3n predecible. Las entradas de c\u00f3digos de barras v\u00e1lidas adivinadas correctamente e introducidas por medio de la interfaz de la aplicaci\u00f3n divulgan las direcciones de correo electr\u00f3nico y los nombres de los candados de los usuarios arbitrarios."}], "id": "CVE-2020-8792", "lastModified": "2024-11-21T05:39:26.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-04T14:15:13.560", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/fierceoj/ownklok"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/fierceoj/ownklok"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-330"}], "source": "nvd@nist.gov", "type": "Primary"}]}