| 제목 | Dialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposure |
|---|
| 설명 | In the Android application ca.diagram.dialogue version 4.3.2, a hardcoded Segment write key was discovered in the source file res/raw/config.json. An attacker can extract this key through reverse engineering and use it to send arbitrary tracking events and modify user profiles via Segment’s API. This allows injection of fraudulent analytics data, potentially leading to corrupted business intelligence, incorrect user segmentation, and misuse of downstream systems that rely on this data. |
|---|
| 원천 | ⚠️ https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-User-Profile-Manipulation-In-ca-diagram-dia-3262de3f97fb802fb5f0d2c9d179dcf6?source=copy_link |
|---|
| 사용자 | fxizenta (UID 28116) |
|---|
| 제출 | 2026. 03. 17. PM 02:06 (20 날 ago) |
|---|
| 모더레이션 | 2026. 04. 03. AM 12:15 (16 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355043 [Dialogue App 까지 4.3.2 켜짐 Android ca.diagram.dialogue config.json SEGMENT_WRITE_KEY 약한 암호화] |
|---|
| 포인트들 | 17 |
|---|