Playground Sessions - Storing User Credentials in Plaintext# CVE-2020-24227
Playground Sessions - Storing User Credentials in Plaintext
Playground Sessions v2.5.582 (and earlier) for Windows, stores the user credentials in plain text allowing anyone with access to C:\Users\<USER>\AppData\Roaming\Playground\Local Store\#SharedObjects\Playground.swf\UserProfiles.sol to extract the email and password.
Login Page:<br><br>

Password:<br><br>

<br><br>Disclosure Timeline:<br>
*August 18, 2020 - Reported to info@playgroundsessions.com - Gave 90 day disclosure timeline - No response
*November 21, 2020 - Public Disclosure
[4.0K] /data/pocs/88ff0ff36fbb53fa53ecff6c6cd29ed924d62442
├── [ 23K] login-page.jpg
├── [298K] password.jpg
└── [ 751] README.md
0 directories, 3 files