CVE-2025-44017

4.3 MEDIUM

📋 TL;DR

The Gunosy mobile app contains an information disclosure vulnerability where JSON Web Tokens (JWTs) may be leaked in outbound communications. If users access a specially crafted URL, attackers could intercept these tokens. This affects all users of vulnerable Gunosy app versions.

💻 Affected Systems

Products:
  • Gunosy mobile application
Versions: Versions prior to the patched release
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default app configuration when processing certain URL schemes or external communications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain valid JWTs and gain unauthorized access to user accounts, potentially accessing personal data, performing actions as the user, or escalating privileges within the app ecosystem.

🟠

Likely Case

Attackers capture JWTs through man-in-the-middle attacks or malicious links, leading to account compromise and unauthorized access to user-specific app functionality.

🟢

If Mitigated

With proper network segmentation and monitoring, token leakage could be detected and contained before exploitation, limiting impact to isolated incidents.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (clicking crafted URL) and network interception capabilities. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest app store updates for Gunosy

Vendor Advisory: https://jvn.jp/en/jp/JVN47404248/

Restart Required: No

Instructions:

1. Update Gunosy app to latest version from official app stores. 2. Ensure automatic updates are enabled. 3. Verify update completion by checking app version in settings.

🔧 Temporary Workarounds

Disable automatic URL handling

all

Prevent app from automatically opening external URLs

No specific commands - configure through device/app settings

Use VPN with certificate pinning

all

Implement VPN with certificate pinning to prevent MITM attacks

🧯 If You Can't Patch

  • Implement network monitoring for JWT leakage in outbound traffic
  • Restrict app network access to trusted domains only using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check app version against latest release notes. Monitor network traffic for JWT tokens in cleartext or predictable locations.

Check Version:

Check app version in device settings > Apps > Gunosy > App Info

Verify Fix Applied:

Update to latest version and test with network monitoring tools to confirm JWTs are no longer leaked in outbound communications.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts from new locations
  • JWTs appearing in unexpected log entries

Network Indicators:

  • JWTs transmitted in URL parameters or headers to untrusted domains
  • Unexpected outbound connections containing authentication tokens

SIEM Query:

source="network_traffic" AND (token="eyJ" OR "Authorization: Bearer") AND dest_ip NOT IN [trusted_domains]

🔗 References

📤 Share & Export