Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-26828 | Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://jvn.jp/en/jp/JVN00414047/index.html |
|
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-04T08:39:25.501Z
Reserved: 2020-01-06T00:00:00.000Z
Link: CVE-2020-5667
No data.
Status : Modified
Published: 2020-11-06T03:15:17.777
Modified: 2024-11-21T05:34:27.090
Link: CVE-2020-5667
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD