Cleartext Storage in a File or on Disk in TimelyBills < 1.7.0 for iOS and versions < 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.
Publication date: Tue, 06 Apr 2021 21:15:00 +0000