| Kura | Airtel (Bharti Airtel Limited) Airtel Thanks App 4.105.4 Insecure Local Storage (OWASP Mobile Top 10: M2, M5) |
|---|
| Gaskiya | The Airtel Android app stores sensitive user data such as payment history, personally identifiable information (PII), and authentication-related tokens in unencrypted local storage. These files are accessible in plaintext format at `/Android/data/com.myairtelapp/files/`, violating OWASP Mobile Top 10 standards. This makes the data easily extractable via physical access, ADB, or malicious apps with basic storage permissions.
The issue exposes:
- Payment transaction logs
- Linked mobile numbers
- User personal info
- Login or auth-related metadata
Impact: A malicious actor with device access or minimal permissions can extract and misuse sensitive Airtel user data.
|
|---|
| Manga | ⚠️ https://github.com/honestcorrupt/-CVE-Proof-of-Concept-Airtel-Android-App-Insecure-Local-Storage-of-Sensitive-Data |
|---|
| Màdùmga | honest_corrupt (UID 85229) |
|---|
| Furta | 06/17/2025 07:02 (8 Wurɗi 전) |
|---|
| Gargajiya | 06/26/2025 22:02 (10 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 314046 [Bharti Airtel Thanks App 4.105.4 ka Android files Bayani fitowa] |
|---|
| Nganji | 20 |
|---|