[Japanese]

JVNDB-2024-000067

"Piccoma" App uses a hard-coded API key for an external service

Overview

"Piccoma" App for Android and "Piccoma" App for iOS provided by Kakao piccoma Corp. use a hard-coded API key for an external service (CWE-798).

Yoshihito Sakai of BroadBand Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
Affected Products


Kakao piccoma Corp.
  • Piccoma - Compic app to enjoy popular manga and hot comics every day (for iOS) versions prior to 6.20.0
  • Piccoma - Compic app to enjoy popular manga and hot comics every day (for Android) versions prior to 6.20.0

Impact

Data in the app may be analyzed and API key for an external service may be obtained.
Note that the users of the app are not directly affected by this vulnerability.
Solution

[Update the Application]
Update the application to the latest version according to the information provided by the developer.

According to the developer, the latest app does not hard-code the API key.
Also the vulnerable API key has been deactivated, therefore the information contained in the vulnerable app cannot be abused.
Vendor Information

Kakao piccoma Corp.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2024-38480
References

  1. JVN : JVN#01073312
Revision History

  • [2024/06/28]
      Web page was published