An issue was discovered in the stashcat app through 3.9.2 for macOS, Windows, Android, iOS, and possibly other platforms. It stores the client_key, the device_id, and the public key for end-to-end encryption in cleartext, enabling an attacker (by copying or having access to the local storage database file) to login to the system from any other computer, and get unlimited access to all data in the users's context.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-5879 An issue was discovered in the stashcat app through 3.9.2 for macOS, Windows, Android, iOS, and possibly other platforms. It stores the client_key, the device_id, and the public key for end-to-end encryption in cleartext, enabling an attacker (by copying or having access to the local storage database file) to login to the system from any other computer, and get unlimited access to all data in the users's context.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:25:16.383Z

Reserved: 2020-05-27T00:00:00

Link: CVE-2020-13637

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-17T17:15:10.550

Modified: 2024-11-21T05:01:38.977

Link: CVE-2020-13637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.