The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-03 15:15
Updated : 2025-09-08 17:40
NVD link : CVE-2025-56608
Mitre link : CVE-2025-56608
CVE.ORG link : CVE-2025-56608
JSON object : View
Products Affected
donbermoy
- android_corona_virus_tracker_app_for_india
CWE
CWE-290
Authentication Bypass by Spoofing
