CVE-2021-20834 (GCVE-0-2021-20834)

Vulnerability from cvelistv5 – Published: 2021-10-13 08:31 – Updated: 2024-08-03 17:53
VLAI?
Summary
Improper authorization in handler for custom URL scheme vulnerability in Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
Severity ?
No CVSS data available.
CWE
  • Improper Authorization in Handler for Custom URL Scheme
Assigner
Impacted products
Vendor Product Version
Nike, Inc. Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 Affected: Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:23.062Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://play.google.com/store/apps/details?id=com.nike.omega"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://apps.apple.com/app/nike/id1095459556"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89126639/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1",
          "vendor": "Nike, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authorization in handler for custom URL scheme vulnerability in Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Authorization in Handler for Custom URL Scheme",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-13T08:31:12",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://play.google.com/store/apps/details?id=com.nike.omega"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://apps.apple.com/app/nike/id1095459556"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/jp/JVN89126639/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2021-20834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Nike, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authorization in handler for custom URL scheme vulnerability in Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Authorization in Handler for Custom URL Scheme"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://play.google.com/store/apps/details?id=com.nike.omega",
              "refsource": "MISC",
              "url": "https://play.google.com/store/apps/details?id=com.nike.omega"
            },
            {
              "name": "https://apps.apple.com/app/nike/id1095459556",
              "refsource": "MISC",
              "url": "https://apps.apple.com/app/nike/id1095459556"
            },
            {
              "name": "https://jvn.jp/en/jp/JVN89126639/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/jp/JVN89126639/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2021-20834",
    "datePublished": "2021-10-13T08:31:12",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:53:23.062Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nike:nike:*:*:*:*:*:iphone_os:*:*\", \"versionEndExcluding\": \"2.177.1\", \"matchCriteriaId\": \"1269DF1C-3A17-4906-BE44-D96C26ACFF07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nike:nike:*:*:*:*:*:android:*:*\", \"versionEndExcluding\": \"2.177.3.3688\", \"matchCriteriaId\": \"762186F3-BAA5-4BDB-BA3D-540EB5321279\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Improper authorization in handler for custom URL scheme vulnerability in Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.\"}, {\"lang\": \"es\", \"value\": \"Una autorizaci\\u00f3n inapropiada en el manejador para la vulnerabilidad del esquema de URL personalizado en Nike App de Android versiones  anteriores a  2.177 y Nike App para iOS versiones anteriores a 2.177.1, permite que un atacante remoto conlleve a un usuario a acceder a un sitio web arbitrario por medio de la aplicaci\\u00f3n vulnerable\"}]",
      "id": "CVE-2021-20834",
      "lastModified": "2024-11-21T05:47:15.013",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2021-10-13T09:15:08.373",
      "references": "[{\"url\": \"https://apps.apple.com/app/nike/id1095459556\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Product\", \"Release Notes\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN89126639/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://play.google.com/store/apps/details?id=com.nike.omega\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Product\"]}, {\"url\": \"https://apps.apple.com/app/nike/id1095459556\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Release Notes\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN89126639/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://play.google.com/store/apps/details?id=com.nike.omega\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-20834\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2021-10-13T09:15:08.373\",\"lastModified\":\"2024-11-21T05:47:15.013\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper authorization in handler for custom URL scheme vulnerability in Nike App for Android versions prior to 2.177 and Nike App for iOS versions prior to 2.177.1 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.\"},{\"lang\":\"es\",\"value\":\"Una autorizaci\u00f3n inapropiada en el manejador para la vulnerabilidad del esquema de URL personalizado en Nike App de Android versiones  anteriores a  2.177 y Nike App para iOS versiones anteriores a 2.177.1, permite que un atacante remoto conlleve a un usuario a acceder a un sitio web arbitrario por medio de la aplicaci\u00f3n vulnerable\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nike:nike:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"2.177.1\",\"matchCriteriaId\":\"1269DF1C-3A17-4906-BE44-D96C26ACFF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nike:nike:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"2.177.3.3688\",\"matchCriteriaId\":\"762186F3-BAA5-4BDB-BA3D-540EB5321279\"}]}]}],\"references\":[{\"url\":\"https://apps.apple.com/app/nike/id1095459556\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\",\"Release Notes\"]},{\"url\":\"https://jvn.jp/en/jp/JVN89126639/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://play.google.com/store/apps/details?id=com.nike.omega\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Product\"]},{\"url\":\"https://apps.apple.com/app/nike/id1095459556\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Release Notes\"]},{\"url\":\"https://jvn.jp/en/jp/JVN89126639/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://play.google.com/store/apps/details?id=com.nike.omega\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…