Retty App for Android versions prior to 4.8.13 and Retty App for iOS versions prior to 4.11.14 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8162 | Retty App for Android versions prior to 4.8.13 and Retty App for iOS versions prior to 4.11.14 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-03T17:53:22.042Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20748
No data.
Status : Modified
Published: 2021-07-14T02:15:07.480
Modified: 2024-11-21T05:47:07.480
Link: CVE-2021-20748
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD