Lucene search

K
jvnJapan Vulnerability NotesJVN:01073312
HistoryJun 28, 2024 - 12:00 a.m.

JVN#01073312: "Piccoma" App uses a hard-coded API key for an external service

2024-06-2800:00:00
Japan Vulnerability Notes
jvn.jp
2
piccoma
android
ios
api key
hard-coded
vulnerability
external service
cwe-798
kakao piccoma corp
update
data privacy

6.6 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

“Piccoma” App for Android and “Piccoma” App for iOS provided by Kakao piccoma Corp. use a hard-coded API key for an external service (CWE-798).

Impact

Data in the app may be analyzed and API key for an external service may be obtained.
Note that the users of the app are not directly affected by this vulnerability.

Solution

Update the Application
Update the application to the latest version according to the information provided by the developer.

According to the developer, the latest app does not hard-code the API key.
Also the vulnerable API key has been deactivated, therefore the information contained in the vulnerable app cannot be abused.

Products Affected

  • “Piccoma” App for Android versions prior to 6.20.0
  • “Piccoma” App for iOS versions prior to 6.20.0

6.6 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%