CVE Vulnerabilities

CVE-2014-1423

Insufficiently Protected Credentials

Published: May 07, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
SignondSignond_project*8.57+15.04.20141127.1-0ubuntu1 (excluding)
SignonUbuntuartful*
SignonUbuntubionic*
SignonUbuntucosmic*
SignonUbuntudevel*
SignonUbuntudisco*
SignonUbuntuesm-apps/bionic*
SignonUbuntuesm-infra/xenial*
SignonUbuntutrusty*
SignonUbuntuupstream*
SignonUbuntuutopic*
SignonUbuntuvivid*
SignonUbuntuvivid/stable-phone-overlay*
SignonUbuntuwily*
SignonUbuntuxenial*
SignonUbuntuyakkety*
SignonUbuntuzesty*

Potential Mitigations

References