Home Cyber Crime Security researchers warn of critical zero-day flaws in ‘age gap’ dating app...

Security researchers warn of critical zero-day flaws in ‘age gap’ dating app Gaper


Adam Bannister

18 February 2021 at 13:08 UTC

Up to date: 18 February 2021 at 13:34 UTC

‘We recognized that it was doable to compromise any account on the appliance inside a 10-minute timeframe’

Security researchers warn of critical zero-day flaws in 'age gap' dating app Gaper

Crucial zero-day vulnerabilities in Gaper, an ‘age hole’ courting app, might be exploited to compromise any consumer account and probably extort customers, safety researchers declare.

The absence of access controls, brute-force safety, and multi-factor authentication within the Gaper app imply attackers may probably exfiltrate delicate private knowledge and use that knowledge to realize full account takeover inside simply 10 minutes.

Extra worryingly nonetheless, the assault didn’t leverage “0-day exploits or superior methods and we might not be stunned if this had not been beforehand exploited within the wild”, mentioned UK-based Ruptura InfoSecurity in a technical write-up revealed yesterday (February 17).

Regardless of the obvious gravity of the risk, researchers mentioned Gaper failed to answer a number of makes an attempt to contact them through electronic mail, their solely assist channel.

GETting private knowledge

Gaper, which launched in the summertime of 2019, is a courting and social networking app geared toward individuals looking for a relationship with youthful or older males or girls.

Ruptura InfoSecurity says the app has round 800,000 customers, largely based mostly within the UK and US.

As a result of certificates pinning was not enforced, the researchers mentioned it was doable to acquire a manipulator-in-the-middle (MitM) place by way of the usage of a Burp Suite proxy.

This enabled them to listen in on “HTTPS site visitors and simply enumerate performance”.

Read more of the latest security vulnerability news

The researchers then arrange a pretend consumer profile and used a GET request to entry the ‘data’ perform, which revealed the consumer’s session token and consumer ID.

This enables an authenticated consumer to question some other consumer’s knowledge, “offering they know their user_id worth” – which is definitely guessed since this worth is “merely incremented by one every time a brand new consumer is created”, mentioned Ruptura InfoSecurity.

“An attacker may iterate by way of the user_id’s to retrieve an intensive record of delicate info that might be utilized in additional focused assaults in opposition to all customers,” together with “electronic mail deal with, date of delivery, location and even gender orientation”, they continued.

Alarmingly, retrievable knowledge can also be mentioned to incorporate user-uploaded pictures, which “are saved inside a publicly accessible, unauthenticated database – probably resulting in extortion-like conditions”.

Covert brute-forcing

Armed with an inventory of consumer electronic mail addresses, the researchers opted in opposition to launching a brute-force assault in opposition to the login perform, as this “may have probably locked each consumer of the appliance out, which might have precipitated an enormous quantity of noise…”.

As an alternative, safety shortcomings within the forgotten password API and a requirement for “solely a single authentication issue” provided a extra discrete path “to an entire compromise of arbitrary consumer accounts”.

The password change API responds to legitimate electronic mail addresses with a 200 OK and an electronic mail containing a four-digit PIN quantity despatched to the consumer to allow a password reset.

Observing a scarcity of fee limiting safety, the researchers wrote a instrument to robotically “request a PIN quantity for a sound electronic mail deal with” earlier than quickly sending requests to the API containing numerous four-digit PIN permutations.

Public disclosure

Of their try to report the problems to Gaper, the safety researchers despatched three emails to the corporate, on November 6 and 12, 2020, and January 4, 2021.

Having acquired no response inside 90 days, they publicly disclosed the zero-days in keeping with Google’s vulnerability disclosure policy.

“Recommendation to customers can be to disable their accounts and be sure that the purposes they use for courting and different delicate actions are suitably safe (at the very least with 2FA),” Tom Heenan, managing director of Ruptura InfoSecurity, advised The Each day Swig.

As of right this moment (February 18), Gaper has nonetheless not responded, he added.

The Each day Swig has additionally contacted Gaper for remark and can replace the article if and once we hear again.

RELATED Grindr fined $10m for ‘grave’ GDPR violations by Norwegian privacy watchdog

Source link