CVE-2025-56608
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/09/2025
Last modified:
08/09/2025
Description
The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
Impact
Base Score 3.x
4.20
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:donbermoy:android_corona_virus_tracker_app_for_india:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/MobSF/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4
- https://github.com/anonaninda/Aninda-security-advisories/blob/main/CVE-2025-56608.md
- https://www.sourcecodester.com/android/14292/android-corona-virus-tracker-app-india-using-b4a.html