Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response.
References
| Link | Resource |
|---|---|
| https://gitlab.e.foundation/e/os/releases/-/releases/v0.19-q#sparkles-we-embedded-other-improvements | Release Notes |
| https://nervuri.net/e/apps | Third Party Advisory |
| https://gitlab.e.foundation/e/os/releases/-/releases/v0.19-q#sparkles-we-embedded-other-improvements | Release Notes |
| https://nervuri.net/e/apps | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:28
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://gitlab.e.foundation/e/os/releases/-/releases/v0.19-q#sparkles-we-embedded-other-improvements - Release Notes | |
| References | () https://nervuri.net/e/apps - Third Party Advisory |
Information
Published : 2023-08-22 19:16
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43171
Mitre link : CVE-2021-43171
CVE.ORG link : CVE-2021-43171
JSON object : View
Products Affected
e.foundation
- app_lounge
CWE
CWE-347
Improper Verification of Cryptographic Signature
