What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain access to the secrets of the user of the affected application. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack.
<a href="https://www.linkedin.com/company/legitsecurity/">Legit Security</a> with <a href="https://www.legitsecurity.com/">Legit Security</a>