The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
History

Fri, 05 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Sourcecodester
Sourcecodester corona Virus Tracker App India
Vendors & Products Google
Google android
Sourcecodester
Sourcecodester corona Virus Tracker App India

Wed, 03 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-290
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 03 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
Description The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-09-03T00:00:00.000Z

Updated: 2025-09-03T19:09:03.703Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-56608

cve-icon Vulnrichment

Updated: 2025-09-03T16:54:40.269Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-03T15:15:37.660

Modified: 2025-09-04T15:36:56.447

Link: CVE-2025-56608

cve-icon Redhat

No data.