Home

Description

The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.

PUBLISHED Reserved 2025-08-17 | Published 2025-09-03 | Updated 2025-09-03 | Assigner mitre

References

www.sourcecodester.com/...s-tracker-app-india-using-b4a.html

github.com/.../master/Document/0x04g-Testing-Cryptography.md

github.com/...ecurity-advisories/blob/main/CVE-2025-56608.md

cve.org (CVE-2025-56608)

nvd.nist.gov (CVE-2025-56608)

Download JSON