Therefore I reverse engineered two dating apps.

Therefore I reverse engineered two dating apps.

Photo and video clip drip through misconfigured S3 buckets

Typically for photos or any other asserts, some form of Access Control List (ACL) will be in position. For assets such as for example profile photos, a standard means of applying ACL will be:

The important thing would act as a “password” to gain access to the file, plus the password would simply be offered users who require usage of the image. When it comes to an app that is dating it’s going to be whoever the profile is presented to.

I have identified several misconfigured buckets that are s3 The League throughout the research. All photos and videos are unintentionally made general general public, with metadata such as which user uploaded them when. Typically the application would obtain the pictures through Cloudfront, a CDN on top associated with the buckets that are s3. Unfortunately the s3 that is underlying are severely misconfigured.

Side note: in so far as i can inform, the profile UUID is arbitrarily produced server-side as soon as the profile is made. To make certain that part is not likely to be very easy to imagine. The filename is managed because of the customer; the host takes any filename. In your client app it’s hardcoded to upload.jpg .

The seller has since disabled listObjects that are public. Nevertheless, we nevertheless think there must be some randomness within the key. A timestamp cannot act as key.

internet protocol address doxing through website website link previews

Link preview is something that is difficult to get appropriate in a complete large amount of messaging apps. You can find typically three approaches for website website website link previews:

The League utilizes recipient-side website link previews. Whenever a note includes a web link to a outside image, the web link is fetched on user’s unit once the message is seen. This could efficiently enable a malicious transmitter to submit an external image URL pointing to an attacker managed host, obtaining recipient’s internet protocol address as soon as the message is exposed. Continue reading “Therefore I reverse engineered two dating apps.”