GSD-2020-5523

Vulnerability from gsd - Updated: 2023-12-13 01:22
Details
Android App 'MyPallete' and some of the Android banking applications based on 'MyPallete' do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Aliases
Aliases

{
  "GSD": {
    "alias": "CVE-2020-5523",
    "description": "Android App \u0027MyPallete\u0027 and some of the Android banking applications based on \u0027MyPallete\u0027 do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.",
    "id": "GSD-2020-5523"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2020-5523"
      ],
      "details": "Android App \u0027MyPallete\u0027 and some of the Android banking applications based on \u0027MyPallete\u0027 do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.",
      "id": "GSD-2020-5523",
      "modified": "2023-12-13T01:22:03.836066Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "vultures@jpcert.or.jp",
        "ID": "CVE-2020-5523",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "\u0027MyPallete\u0027 and some of the Android banking applications that use \u0027MyPallete\u0027",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "MyPallete all versions, AshikagaBankingAppli ver1.0.4 and earlier, SENSHUIKEDABANKBankingAppli ver3.0.4 and earlier, ShikokuBankingAppli ver2.0.1 and earlier, TohokuBankingAppli ver1.0.1 and earlier, NaganoBankingAppli ver1.0.1 and earlier, 77BankingAppli ver2.0.1 and earlier, HokkaidoBankingAppli ver3.0.1 and earlier, and HokurikuBankingAppli ver2.0.1 and earlier"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "NTT Data Corporation"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Android App \u0027MyPallete\u0027 and some of the Android banking applications based on \u0027MyPallete\u0027 do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Fails to verify SSL certificates"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://www.dokodemobank.ne.jp/info_20200128_bankingapp.html",
            "refsource": "MISC",
            "url": "http://www.dokodemobank.ne.jp/info_20200128_bankingapp.html"
          },
          {
            "name": "https://www.ashikagabank.co.jp/appbanking/pdf/oshirase.pdf",
            "refsource": "MISC",
            "url": "https://www.ashikagabank.co.jp/appbanking/pdf/oshirase.pdf"
          },
          {
            "name": "https://www.sihd-bk.jp/common_v2/pdf/20200127.pdf",
            "refsource": "MISC",
            "url": "https://www.sihd-bk.jp/common_v2/pdf/20200127.pdf"
          },
          {
            "name": "https://www.shikokubank.co.jp/info/apps20200128.html",
            "refsource": "MISC",
            "url": "https://www.shikokubank.co.jp/info/apps20200128.html"
          },
          {
            "name": "https://www.tohoku-bank.co.jp/news/topics/200128_applissl.html",
            "refsource": "MISC",
            "url": "https://www.tohoku-bank.co.jp/news/topics/200128_applissl.html"
          },
          {
            "name": "https://www.naganobank.co.jp/soshiki/2/app-ssl.html",
            "refsource": "MISC",
            "url": "https://www.naganobank.co.jp/soshiki/2/app-ssl.html"
          },
          {
            "name": "https://www.77bank.co.jp/pdf/oshirase/20012801_appvulnerability.pdf",
            "refsource": "MISC",
            "url": "https://www.77bank.co.jp/pdf/oshirase/20012801_appvulnerability.pdf"
          },
          {
            "name": "https://www.hokkaidobank.co.jp/common/dat/2020/0120/15795047141946146699.pdf",
            "refsource": "MISC",
            "url": "https://www.hokkaidobank.co.jp/common/dat/2020/0120/15795047141946146699.pdf"
          },
          {
            "name": "https://www.hokugin.co.jp/info/archives/personal/2020/1913.html",
            "refsource": "MISC",
            "url": "https://www.hokugin.co.jp/info/archives/personal/2020/1913.html"
          },
          {
            "name": "http://jvn.jp/en/jp/JVN28845872/index.html",
            "refsource": "MISC",
            "url": "http://jvn.jp/en/jp/JVN28845872/index.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:77bank:77_bank:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:ashikagabank:ashigin:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.0.4",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hokkaidobank:dogin:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hokugin:hokuriku_bank_portal:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:naganobank:nagagin:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:nttdata:mypallete:-:*:*:*:*:android:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:shikokubank:shikoku_bank:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sihd-bk:ikeda_senshu_bank:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.0.4",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:tohoku-bank:tougin:*:*:*:*:*:android:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.0.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2020-5523"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Android App \u0027MyPallete\u0027 and some of the Android banking applications based on \u0027MyPallete\u0027 do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-295"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hokugin.co.jp/info/archives/personal/2020/1913.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.hokugin.co.jp/info/archives/personal/2020/1913.html"
            },
            {
              "name": "https://www.ashikagabank.co.jp/appbanking/pdf/oshirase.pdf",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.ashikagabank.co.jp/appbanking/pdf/oshirase.pdf"
            },
            {
              "name": "http://www.dokodemobank.ne.jp/info_20200128_bankingapp.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.dokodemobank.ne.jp/info_20200128_bankingapp.html"
            },
            {
              "name": "https://www.sihd-bk.jp/common_v2/pdf/20200127.pdf",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.sihd-bk.jp/common_v2/pdf/20200127.pdf"
            },
            {
              "name": "https://www.naganobank.co.jp/soshiki/2/app-ssl.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.naganobank.co.jp/soshiki/2/app-ssl.html"
            },
            {
              "name": "https://www.shikokubank.co.jp/info/apps20200128.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.shikokubank.co.jp/info/apps20200128.html"
            },
            {
              "name": "https://www.77bank.co.jp/pdf/oshirase/20012801_appvulnerability.pdf",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.77bank.co.jp/pdf/oshirase/20012801_appvulnerability.pdf"
            },
            {
              "name": "https://www.hokkaidobank.co.jp/common/dat/2020/0120/15795047141946146699.pdf",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.hokkaidobank.co.jp/common/dat/2020/0120/15795047141946146699.pdf"
            },
            {
              "name": "http://jvn.jp/en/jp/JVN28845872/index.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://jvn.jp/en/jp/JVN28845872/index.html"
            },
            {
              "name": "https://www.tohoku-bank.co.jp/news/topics/200128_applissl.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.tohoku-bank.co.jp/news/topics/200128_applissl.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 4.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "exploitabilityScore": 2.2,
          "impactScore": 5.2
        }
      },
      "lastModifiedDate": "2020-01-31T20:24Z",
      "publishedDate": "2020-01-28T06:15Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…