Fortinet Discovers Credentials and Private Information Leak Vulnerability in Android Application of Air France
Fortinet's FortiGuard Labs has discovered a leak of credentials and private data in Air France's mobile application for Android. This mobile application is used by customers of Air France to handle their flight reservations, boarding passes and other information.
The vulnerability is known to affect the application version 3.3.1 (APK sha256: `fc69135a7afa5b1e42462a0fb94824266b74c9d31e3cc6b1c7e015eef8e3f1ec`).
The vulnerability results in a local leak of crucial customer information such as login and password to customer account, identity, upcoming travel details, etc. This information is not sent remotely but maybe read by any unprivileged process on the smartphone.
The vulnerability has been fixed by Air France and end-users should make sure they use an Air France mobile application downloaded on or after December 21, 2017, with version 3.4.0 or greater.
Additionally, end-users of the mobile Air France application should consider modifying the credentials for their Air France account.
Fortinet reported the vulnerability to Air France on December 15, 2017.
Air France confirmed the vulnerability on December 21, 2017.
Air France patched the vulnerability on December 21, 2017.
This vulnerability was discovered by Axelle Apvrille of Fortinet's FortiGuard Labs.