Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-11384 : Exploit Details and Defense Strategies

Learn about CVE-2019-11384 where Zalora Android app version 6.15.1 insecurely stores user credentials, allowing unauthorized access to sensitive data. Find mitigation steps and prevention measures.

Insecure storage of sensitive data in Zalora Android application version 6.15.1 allows unauthorized access to user credentials.

Understanding CVE-2019-11384

The vulnerability in the Zalora Android app version 6.15.1 exposes user login credentials due to insecure data storage.

What is CVE-2019-11384?

The Zalora Android app version 6.15.1 insecurely stores sensitive data, enabling non-root users to access login credentials.

The Impact of CVE-2019-11384

The vulnerability allows unauthorized users to retrieve usernames and passwords of authenticated users stored in plain text.

Technical Details of CVE-2019-11384

The technical aspects of the Zalora Android app vulnerability.

Vulnerability Description

The Zalora Android app version 6.15.1 fails to securely store sensitive data, allowing access to user credentials.

Affected Systems and Versions

        Product: Zalora Android application
        Version: 6.15.1

Exploitation Mechanism

Unauthorized users can access the login_data.xml file at /data/data/com.zalora.android/shared_prefs to reveal usernames and passwords.

Mitigation and Prevention

Steps to address and prevent the CVE-2019-11384 vulnerability.

Immediate Steps to Take

        Update the Zalora app to a secure version
        Avoid storing sensitive data in plain text

Long-Term Security Practices

        Implement encryption for sensitive data storage
        Regularly audit and secure data storage practices

Patching and Updates

Apply patches and updates provided by Zalora to address the insecure data storage vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now