| [Japanese] | 
| JVNDB-2024-000067 | 
| "Piccoma" App uses a hard-coded API key for an external service | 
|
| 
 
"Piccoma" App for Android and "Piccoma" App for iOS provided by Kakao piccoma Corp. use a hard-coded API key for an external service (CWE-798).
 Yoshihito Sakai of BroadBand Security, Inc. reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 4.0 (Medium) [IPA Score]
 
    Attack Vector: LocalAttack Complexity: LowPrivileges Required: NoneUser Interaction: NoneScope: UnchangedConfidentiality Impact: LowIntegrity Impact: NoneAvailability Impact: None 
  
 | 
|
| 
 
	
 | 
| 
 
	Kakao piccoma Corp.
	
		Piccoma - Compic app to enjoy popular manga and hot comics every day (for iOS) versions prior to 6.20.0Piccoma - Compic app to enjoy popular manga and hot comics every day (for Android) versions prior to 6.20.0 | 
| 
 
	
 | 
|
| 
 
Data in the app may be analyzed and API key for an external service may be obtained.Note that the users of the app are not directly affected by this vulnerability.
 | 
|
| 
 
[Update the Application]Update the application to the latest version according to the information provided by the developer.
 
 According to the developer, the latest app does not hard-code the API key.
 Also the vulnerable API key has been deactivated, therefore the information contained in the vulnerable app cannot be abused.
 | 
|
| 
 
	Kakao piccoma Corp.
	
 | 
|
| 
 
	No Mapping(CWE-Other) [IPA Evaluation] | 
|
| 
 
	CVE-2024-38480  | 
|
| 
 
	JVN : JVN#01073312  | 
|
| 
 
	[2024/06/28]Web page was published
 
 |