Отправить #781761: Dialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key ExposureИнформация

НазваниеDialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposure
ОписаниеIn the Android application ca.diagram.dialogue version 4.3.2, a hardcoded Segment write key was discovered in the source file res/raw/config.json. An attacker can extract this key through reverse engineering and use it to send arbitrary tracking events and modify user profiles via Segment’s API. This allows injection of fraudulent analytics data, potentially leading to corrupted business intelligence, incorrect user segmentation, and misuse of downstream systems that rely on this data.
Источник⚠️ https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-User-Profile-Manipulation-In-ca-diagram-dia-3262de3f97fb802fb5f0d2c9d179dcf6?source=copy_link
Пользователь
 fxizenta (UID 28116)
Представление17.03.2026 14:06 (23 дни назад)
Модерация03.04.2026 00:15 (16 days later)
Статуспринято
Запись VulDB355043 [Dialogue App до 4.3.2 на Android ca.diagram.dialogue config.json SEGMENT_WRITE_KEY слабое шифрование]
Баллы17

Want to know what is going to be exploited?

We predict KEV entries!