The SHAREit application before 4.0.36 for Android allows a remote attacker (on the same network or joining public "open" Wi-Fi hotspots created by the application when file transfer is initiated) to bypass authentication by trying to fetch a non-existing page. When the non-existing page is requested, the application responds with a 200 status code and empty page, and adds the requesting client device into the list of recognized devices.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-19294 The SHAREit application before 4.0.36 for Android allows a remote attacker (on the same network or joining public "open" Wi-Fi hotspots created by the application when file transfer is initiated) to bypass authentication by trying to fetch a non-existing page. When the non-existing page is requested, the application responds with a 200 status code and empty page, and adds the requesting client device into the list of recognized devices.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:10:08.278Z

Reserved: 2019-03-22T00:00:00

Link: CVE-2019-9939

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-22T08:29:00.780

Modified: 2024-11-21T04:52:38.213

Link: CVE-2019-9939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.