CVE-2025-56608

The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:donbermoy:android_corona_virus_tracker_app_for_india:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-09-03 15:15

Updated : 2025-09-08 17:40


NVD link : CVE-2025-56608

Mitre link : CVE-2025-56608

CVE.ORG link : CVE-2025-56608


JSON object : View

Products Affected

donbermoy

  • android_corona_virus_tracker_app_for_india
CWE
CWE-290

Authentication Bypass by Spoofing