Insecure data storage in Polar Flow Android application
Overview
Advisory ID: TRSA-2110-01
Advisory version: 1.0
Advisory status: Public
Advisory URL: https://trovent.io/security-advisory-2110-01
Affected product: Polar Flow Android mobile application (fi.polar.polarflow)
Affected version: 5.7.1
Vendor: Polar Electro, https://flow.polar.com
Credits: Trovent Security GmbH, Karima Hebbal
Detailed description
The Polar Flow app is a sports, fitness and activity analyzer which allows to plan and monitor training, daily activity and sleep.
Trovent Security GmbH discovered that the application stores the username and password in clear text in a file on the mobile device.
Severity: Medium
CVSS Score: 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)
CVE ID: N/A
CWE ID: CWE-312
Proof of concept
Content of the file /data/data/fi.polar.polarflow/shared_prefs/UserData3.xml:
<?xml version='1.0' encoding='utf-8' standalone='yes' ?> <map> <string name="current_device_id">no_device</string> <int name="last_version_code" value="5070103" /> <string name="base_url">https://www.polarremote.com/v2/users/54871065</string> <string name="last_name">Ptest</string> <int name="key_initial_view_resource_id" value="2131363187" /> <boolean name="valid_ver_two" value="true" /> <long name="problem_phone_message_time" value="1634888249727" /> <boolean name="new_blogs_available" value="true" /> <string name="address_json">{"city":"\u003cscript\u003ealert(1)\u003c/script\ u003e","countryCode":"DE","modified":"2021-10-22T07:37:5 3.000Z"}</string> <string name="profile_json">{"favoriteSports":[]}</string> <string name="password">Test2021</string> <string name="last_blog_sync_time">2021-10-22T09:37:18.309</string> <long name="user_id" value="54871065" /> <boolean name="initial_remote_sync_executed" value="true" /> <string name="preferred_blog_language">en</string> <int name="key_training_diary_tab" value="0" /> <string name="first_name">Ptest</string> <int name="should_show_problem_phone_message" value="2" /> <string name="username"></string> </map>
Solution / Workaround
We recommend not to store sensitive information in clear text on the mobile device.
Fixed in version 6.3.0, verified by Trovent.
History
2021-10-18: Vulnerability found
2021-12-15: Vendor contacted
2022-01-20: Contacted vendor again
2022-01-21: Vendor replied that the vulnerability will be checked
2022-01-28: Vendor replied, the vulnerability will be fixed in a future update
2022-07-27: Vendor contacted, asking for status
2022-08-09: Vendor replied, the vulnerability is fixed since version 6.3.0
2022-08-17: Trovent verified remediation of the vulnerability
2022-08-18: Advisory published