Súbít #598122: Airtel (Bharti Airtel Limited) Airtel Thanks App 4.105.4 Insecure Local Storage (OWASP Mobile Top 10: M2, M5)bayani

KuraAirtel (Bharti Airtel Limited) Airtel Thanks App 4.105.4 Insecure Local Storage (OWASP Mobile Top 10: M2, M5)
GaskiyaThe Airtel Android app stores sensitive user data such as payment history, personally identifiable information (PII), and authentication-related tokens in unencrypted local storage. These files are accessible in plaintext format at `/Android/data/com.myairtelapp/files/`, violating OWASP Mobile Top 10 standards. This makes the data easily extractable via physical access, ADB, or malicious apps with basic storage permissions. The issue exposes: - Payment transaction logs - Linked mobile numbers - User personal info - Login or auth-related metadata Impact: A malicious actor with device access or minimal permissions can extract and misuse sensitive Airtel user data.
Manga⚠️ https://github.com/honestcorrupt/-CVE-Proof-of-Concept-Airtel-Android-App-Insecure-Local-Storage-of-Sensitive-Data
Màdùmga honest_corrupt (UID 85229)
Furta06/17/2025 07:02 (8 Wurɗi 전)
Gargajiya06/26/2025 22:02 (10 days later)
HalittaShingilam
VulDB gite314046 [Bharti Airtel Thanks App 4.105.4 ka Android files Bayani fitowa]
Nganji20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!