# Trovent Security Advisory 2110-01 # ##################################### Insecure data storage in Polar Flow Android application ####################################################### Overview ######## Advisory ID: TRSA-2110-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2110-01 Affected product: Polar Flow Android mobile application (fi.polar.polarflow) Affected version: 5.7.1 Vendor: Polar Electro, https://flow.polar.com Credits: Trovent Security GmbH, Karima Hebbal Detailed description #################### The Polar Flow app is a sports, fitness and activity analyzer which allows to plan and monitor training, daily activity and sleep. Trovent Security GmbH discovered that the application stores the username and password in clear text in a file on the mobile device. Severity: Medium CVSS Score: 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) CVE ID: N/A CWE ID: CWE-312 Proof of concept ################ Content of the file /data/data/fi.polar.polarflow/shared_prefs/UserData3.xml: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ no_device https://www.polarremote.com/v2/users/54871065 Ptest {"city":"\u003cscript\u003ealert(1)\u003c/script\ u003e","countryCode":"DE","modified":"2021-10-22T07:37:5 3.000Z"} {"favoriteSports":[]} Test2021 2021-10-22T09:37:18.309 en Ptest ptesttest11@gmail.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution / Workaround ##################### We recommend not to store sensitive information in clear text on the mobile device. Fixed in version 6.3.0, verified by Trovent. History ####### 2021-10-18: Vulnerability found 2021-12-15: Vendor contacted 2022-01-20: Contacted vendor again 2022-01-21: Vendor replied that the vulnerability will be checked 2022-01-28: Vendor replied, the vulnerability will be fixed in a future update 2022-07-27: Vendor contacted, asking for status 2022-08-09: Vendor replied, the vulnerability is fixed since version 6.3.0 2022-08-17: Trovent verified remediation of the vulnerability 2022-08-18: Advisory published