Learn about CVE-2020-12624 affecting The League app on Android, allowing attackers to hijack sessions. Find mitigation steps and prevention measures here.
The League application before 2020-05-02 on Android sends a bearer token in an HTTP Authorization header to an arbitrary website, allowing remote attackers to hijack sessions.
Understanding CVE-2020-12624
This CVE describes a vulnerability in The League application on Android that can be exploited by attackers to hijack user sessions.
What is CVE-2020-12624?
The League application on Android sends sensitive authentication information to external sites, enabling attackers to take over user sessions.
The Impact of CVE-2020-12624
The vulnerability allows remote attackers to hijack user sessions by intercepting bearer tokens sent in HTTP headers.
Technical Details of CVE-2020-12624
The following technical details provide insight into the vulnerability.
Vulnerability Description
The League application on Android sends bearer tokens in HTTP headers to external sites, facilitating session hijacking.
Affected Systems and Versions
Exploitation Mechanism
Attackers exploit the reuse of OkHttp objects in the application to intercept bearer tokens and hijack user sessions.
Mitigation and Prevention
Protecting against CVE-2020-12624 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates