Hotspot Shield runs a webserver with a static IP address 127.0.0.1 and port 895. The web server uses JSONP and hosts sensitive information including configuration. User controlled input is not sufficiently filtered: an unauthenticated attacker can send a POST request to /status.js with the parameter func=$_APPLOG.Rfunc and extract sensitive information about the machine, including whether the user is connected to a VPN, to which VPN he/she is connected, and what is their real IP address.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-01-31T17:00:00
Updated: 2024-08-05T06:01:49.271Z
Reserved: 2018-01-31T00:00:00
Link: CVE-2018-6460
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-01-31T17:29:00.217
Modified: 2024-11-21T04:10:42.513
Link: CVE-2018-6460
Redhat
No data.