SIK-2017-039
Title:
SQLi in Login Form from GPS Location Tracker App
Report ID
SIK-2017-039
Summary:
- Vendor: SeeBetaApp
- Product: Track My Family (Package-name: com.betaapp.myfamilylocator)
- Affected Version: 2.6
- Severity: high
- Short summary: SQLi in Login form breaks authentication
Details:
The app uses a backend in which the user needs to login in order to use the service. A user is identified by her phone number and authenticated by a user-defined password. Phone number and password are transmitted over an insecure network channel (http) via get parameters. The backend does not sanitize the given input properly, which makes the login vulnerable against SQL injection attacks:
http://******/*******/login.php?password=test' or '' = '&mobile=1234567890
With this request, an adversary can login as user with the given mobile number.
Workaround
–
Suggested Mitigation
There needs to be a proper input sanitization. More details can be found at https://www.owasp.org/index.php/Data_Validation
Timeline
- 2017-08-09 Vulnerability Discovered
- 2017-08-10 Contaced developer
- 2018-08-11 Published