So I reverse engineered two dating apps.

So I reverse engineered two dating apps.

And I also got a session that is zero-click as well as other fun weaknesses

On this page I reveal a few of my findings throughout the engineering that is reverse of apps Coffee Meets Bagel while the League. I have identified a few critical weaknesses through the research, all of these have now been reported towards the vendors that are affected.

Introduction

Within these unprecedented times, greater numbers of individuals are escaping to the electronic globe to deal with social distancing. Over these right times cyber-security is more crucial than in the past. From my experience that is limited few startups are mindful of security recommendations. The firms accountable for a range that is large of apps are not any exclusion. We began this small research study to see exactly exactly how secure the dating apps that are latest are.

Accountable disclosure

All high severity weaknesses disclosed in this article have now been reported into the vendors. By the time of publishing, matching patches happen released, and I also have actually separately confirmed that the repairs have been in destination.

I shall maybe perhaps maybe not offer details within their proprietary APIs unless appropriate.

The prospect apps

We picked two popular apps that are dating on iOS and Android os.

Coffee Suits Bagel

Coffee matches Bagel or CMB for brief, established in 2012, is well known for showing users a restricted amount of matches each and every day. They’ve been hacked when in 2019, with 6 million records taken. Leaked information included a name that is full email, age, enrollment date, and sex. CMB happens to be popularity that is gaining the last few years, and makes an excellent prospect with this task.

The League

The tagline when it comes to League software is “date intelligently”. Launched a while in 2015, it really is an app that is members-only with acceptance and fits predicated on LinkedIn and Twitter pages. The software is more high priced and selective than its options, it is safety on par using the price?

Testing methodologies

I personally use a mixture of fixed analysis and powerful analysis for reverse engineering. For fixed analysis we decompile the APK, mostly making use of apktool and jadx. For powerful analysis an MITM is used by me system proxy with SSL proxy capabilities.

Most of the assessment is performed in the Android os that is rooted emulator Android 8 Oreo. Tests that want more capabilities are done on a genuine Android os unit lineage that is running 16 (according to Android Pie), rooted with Magisk.

Findings on CMB

Both apps have a great deal of trackers and telemetry, but i assume that is simply hawaii associated with industry. CMB has more trackers compared to the League though.

See whom disliked you full of desire how to use on CMB using this one trick that is simple

The API carries a pair_action industry in almost every bagel item which is an enum with all the values that are following

There is certainly an API that offered a bagel ID returns the object that is bagel. The bagel ID is shown within the batch of daily bagels. Therefore you, you could try the following if you want to see if someone has rejected:

It is a safe vulnerability, however it is funny that this industry is exposed through the API it is unavailable through the software.

Geolocation data leak, yet not actually

CMB shows other users’ longitude and latitude up to 2 decimal places, that is around 1 mile that is square. Luckily this given info is perhaps perhaps not real-time, and it’s also just updated whenever a person chooses to upgrade their location. (we imagine this can be used because of the software for matchmaking purposes. I’ve maybe not confirmed this theory.)

Nonetheless, this field is thought by me could possibly be concealed through the reaction.

Findings on The League

Client-side produced verification tokens

The League does one thing pretty unusual within their login flow:

The UUID that becomes the bearer is completely client-side generated. Even even even Worse, the host doesn’t validate that the bearer value is a real valid UUID. It may cause collisions as well as other dilemmas.

I will suggest changing the login model therefore the token that is bearer generated server-side and provided for the client when the host receives the right OTP through the customer.

Contact number drip via an unauthenticated API

Within the League there is certainly an unauthenticated api that accepts a contact quantity as question parameter. The API leakages information in HTTP reaction code. Once the contact number is registered, it returns 200 okay , nevertheless when the quantity is certainly not registered, it returns 418 we’m a teapot . It may be mistreated in a couple of methods, e.g. mapping all of the figures under a place rule to see that is in the League and that is perhaps perhaps perhaps not. Or it may induce prospective embarrassment whenever your coworker realizes you’re on the application.

This has because been fixed if the bug was reported to your merchant. Now the API merely returns 200 for several needs.

LinkedIn task details

The League integrates with LinkedIn to exhibit a user’s job and employer name to their profile. Often it goes a bit overboard collecting information. The profile API comes back job that is detailed information scraped from LinkedIn, such as the begin 12 months, end 12 months, etc.

Even though the software does ask individual authorization to learn LinkedIn profile, an individual most likely will not expect the position that is detailed become contained in their profile for everybody else to look at. I actually do perhaps not genuinely believe that form of info is required for the application to work, and it may oftimes be excluded from profile information.

Leave a Reply

Your email address will not be published. Required fields are marked *