
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-43991) affects the PRIMA CLINIC mini-app on Line version 13.6.1. The issue involves the exposure of a channel access token, which is a critical credential used for securing communication within Line. This vulnerability was discovered in the application's response from www.l-members.me/miniapp/members_card endpoint (GitHub Report).
The vulnerability is classified as an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200). The issue occurs when the application exposes its channel access token in the client-side response. This token is used for authentication with the Line API, specifically in requests to https://api.line.me/message/v3/notifier/token where it's included in the Authorization header (GitHub Report). The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N (NVD).
The exposure of the channel access token allows attackers to send crafted malicious notifications through the Line platform. Any user of the PRIMA CLINIC mini-app is potentially affected by this vulnerability. Attackers can exploit this to broadcast unauthorized messages, including malicious website links and fraudulent information (GitHub Report).
The vulnerability affects Line v13.6.1, but specific mitigation details or patches have not been publicly disclosed in the available sources (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."