The SourceCodester Android application "Corona Virus...
Moderate severity
Unreviewed
Published
Sep 3, 2025
to the GitHub Advisory Database
•
Updated Sep 8, 2025
Description
Published by the National Vulnerability Database
Sep 3, 2025
Published to the GitHub Advisory Database
Sep 3, 2025
Last updated
Sep 8, 2025
The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in
OkHttpClientWrapper.java
. ThehandleDigest()
function employsMessageDigest.getInstance("MD5")
to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.References