
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the Books-futaba mini-app on Line v13.6.1 that exposes the channel access token to client-side users. The vulnerability allows attackers to access sensitive authentication credentials that should be kept secret (GitHub Report). The vulnerability was assigned CVE-2023-43998 and has been classified with a CVSS v3.1 Base Score of 5.4 (MEDIUM) (NVD).
The vulnerability exists in the response of the request to 'www.l-members.me/miniapp/members_card', which exposes the channel access token. This token is used for securing communication channels within Line and should be strictly protected. The CVSS v3.1 vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, indicating network accessibility with low attack complexity (GitHub Report, NVD).
The exposure of the channel access token allows attackers to potentially broadcast malicious messages through the Line platform. Any user of the Books-futaba mini-app could be affected, potentially receiving malicious broadcast messages containing fraudulent information or malicious website links (GitHub Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."