Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-5961
Analyzed
More InfoOfficial Page
Source-vultures@jpcert.or.jp
View Known Exploited Vulnerability (KEV) details
Published At-05 Jul, 2019 | 14:15
Updated At-10 Jul, 2019 | 13:33

The Android App 'Tootdon for Mastodon' version 3.4.1 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.4HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

mastodon-tootdon
mastodon-tootdon
>>tootdon_for_mastodon>>Versions up to 3.4.1(inclusive)
cpe:2.3:a:mastodon-tootdon:tootdon_for_mastodon:*:*:*:*:*:android:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://blog.mastodon-tootdon.com/entry/2019/05/20/204019vultures@jpcert.or.jp
Vendor Advisory
https://jvn.jp/en/jp/JVN57806517/index.htmlvultures@jpcert.or.jp
Third Party Advisory
Change History
0Changes found

Details not found