Lucene search

K
jvnJapan Vulnerability NotesJVN:64453490
HistoryMar 13, 2023 - 12:00 a.m.

JVN#64453490: Android App "Wolt Delivery: Food and more" uses a hard-coded API key for an external service

2023-03-1300:00:00
Japan Vulnerability Notes
jvn.jp
26
android
wolt
api key vulnerability
update
version 4.28.0
cwe-798
external service

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Android App “Wolt Delivery: Food and more” provided by Wolt uses a hard-coded API key for an external service (CWE-798).

Impact

The hard-coded API key may be retrieved via reverse-engineering the application binary.
Note that the application users are not directly affected by this vulnerability.

Solution

Update the Application
Update the application to the latest version according to the information provided by the developer.
According to the developer, the following version, which fixes this vulnerability by deleting API keys, was released in November 2022.

  • Android App “Wolt Delivery: Food and more” version 4.28.0

Products Affected

  • Android App “Wolt Delivery: Food and more” version 4.27.2 and earlier

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for JVN:64453490