Enviar #781761: Dialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposureinformación

TítuloDialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposure
DescripciónIn the Android application ca.diagram.dialogue version 4.3.2, a hardcoded Segment write key was discovered in the source file res/raw/config.json. An attacker can extract this key through reverse engineering and use it to send arbitrary tracking events and modify user profiles via Segment’s API. This allows injection of fraudulent analytics data, potentially leading to corrupted business intelligence, incorrect user segmentation, and misuse of downstream systems that rely on this data.
Fuente⚠️ https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-User-Profile-Manipulation-In-ca-diagram-dia-3262de3f97fb802fb5f0d2c9d179dcf6?source=copy_link
Usuario
 fxizenta (UID 28116)
Sumisión2026-03-17 14:06 (hace 18 días)
Moderación2026-04-03 00:15 (16 days later)
EstadoAceptado
Entrada de VulDB355043 [Dialogue App hasta 4.3.2 en Android ca.diagram.dialogue config.json SEGMENT_WRITE_KEY cifrado débil]
Puntos17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!