漏洞标题
N/A
漏洞描述信息
**争议** 在org.telegram.messenger应用程序4.8.11Android版本中发现一个问题。 biometric验证的FingerprintManager类允许通过从onAuthenticationFailed到onAuthenticationSucceeded的回调方法绕过身份验证,返回null。这是因为没有实现FingerprintAPI与AndroidKeyGenerator类的组合。换句话说,攻击者可以使用任意的指纹识别。请注意:供应商表示,在这种威胁模型背景下,这不是一个值得注意的攻击,该威胁模型排除了已root的Android设备。
CVSS信息
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
org.telegram.messenger application for Android 安全漏洞
漏洞描述信息
org.telegram.messenger application for Android是一款基于Android平台的即时通讯应用程序。 基于Android平台的org.telegram.messenger应用程序4.8.11版本存在安全漏洞。攻击者可利用该漏洞使用任意指纹通过身份验证。
CVSS信息
N/A
漏洞类别
授权问题