
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-48134) affects nagayamacopabowl Line version 13.6.1, which exposes sensitive information to unauthorized actors. The issue specifically involves the exposure of the channel access token, a critical credential used for securing communication within Line, to client-side users ([GitHub Report](https://github.com/syz913/CVE-reports/blob/main/nagayamacopabowl.md)). The vulnerability was assigned a CVSS v3.1 base score of 7.5 HIGH, indicating significant security implications (NVD).
The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The exploit can be triggered when a client with Line installed opens the mini-app 'nagayamacopabowl'. The channel access token is exposed in the response of the request to 'www.l-members.me/miniapp/memberscard'. This token is used for authentication in the request header 'Authorization' for 'https://api.line.me/message/v3/notifier/token' (GitHub Report).
The exposure of the channel access token allows attackers to potentially broadcast malicious messages through the compromised channel. Any user of the nagayamacopabowl mini-app is potentially affected, putting them at risk of receiving malicious broadcast messages including fraudulent information and dangerous website links ([GitHub Report](https://github.com/syz913/CVE-reports/blob/main/nagayamacopabowl.md)).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."