CVE-2024-3305
📋 TL;DR
This vulnerability allows attackers to bypass authorization controls in Utarit Information SoliClub mobile apps by manipulating user-controlled keys, potentially exposing embedded sensitive data. It affects iOS users running versions before 4.4.0 and Android users running versions before 5.2.1.
💻 Affected Systems
- Utarit Information SoliClub
📦 What is this software?
Soliclub by Utarit
Soliclub by Utarit
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive user data stored within the application, potentially including personal information, authentication tokens, or other embedded secrets.
Likely Case
Unauthorized access to user-specific sensitive data that should be protected by authorization checks.
If Mitigated
Limited or no data exposure if proper input validation and authorization checks are implemented.
🎯 Exploit Status
Exploitation requires some user interaction or access to the application, but the bypass mechanism appears straightforward based on the CWE description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS: 4.4.0+, Android: 5.2.1+
Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-1457
Restart Required: Yes
Instructions:
1. Update SoliClub app from official app stores (Apple App Store for iOS, Google Play Store for Android). 2. Ensure version is at least 4.4.0 for iOS or 5.2.1 for Android. 3. Restart the application after update.
🔧 Temporary Workarounds
Disable or restrict app usage
allTemporarily prevent use of vulnerable versions until patching is complete
Network segmentation
allRestrict network access for mobile devices running vulnerable versions
🧯 If You Can't Patch
- Implement mobile device management (MDM) policies to restrict app functionality
- Monitor for unusual data access patterns and implement enhanced logging
🔍 How to Verify
Check if Vulnerable:
Check app version in SoliClub settings: iOS must be <4.4.0, Android must be <5.2.1
Check Version:
Check within SoliClub app settings menu for version information
Verify Fix Applied:
Confirm app version shows iOS ≥4.4.0 or Android ≥5.2.1 in app settings
📡 Detection & Monitoring
Log Indicators:
- Unusual data access patterns
- Authorization failure logs followed by successful data retrieval
Network Indicators:
- Unexpected data transfers from mobile app to external endpoints
SIEM Query:
Look for mobile app logs showing data access without proper authorization events