The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.15.2. This is due to the use of loose comparison in the 'verify_id_token' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to an @flutter.io email address or phone number. This also requires firebase to be configured on the website and the user to have set up firebase for their account.
History

Thu, 15 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Inspireui
Inspireui mstore Api Create Native Android And Ios Apps On The Cloud
CPEs cpe:2.3:a:inspireui:mstore_api_create_native_android_and_ios_apps_on_the_cloud:*:*:*:*:*:*:*:*
Vendors & Products Inspireui
Inspireui mstore Api Create Native Android And Ios Apps On The Cloud
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 Aug 2024 02:45:00 +0000

Type Values Removed Values Added
Description The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.15.2. This is due to the use of loose comparison in the 'verify_id_token' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to an @flutter.io email address or phone number. This also requires firebase to be configured on the website and the user to have set up firebase for their account.
Title MStore API – Create Native Android & iOS Apps On The Cloud <= 4.15.2 - Authentication Bypass to Account Takeover
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-15T02:30:37.281Z

Updated: 2024-08-15T13:15:59.205Z

Reserved: 2024-08-08T20:06:31.672Z

Link: CVE-2024-7628

cve-icon Vulnrichment

Updated: 2024-08-15T13:15:52.984Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-15T03:15:05.310

Modified: 2024-08-15T13:01:10.150

Link: CVE-2024-7628

cve-icon Redhat

No data.