Mutti (Bogestra) App Insecure Database Replication

Report ID:



  • Vendor: GeoMobile GmbH
  • Product: Mutti (BOGESTRA Public Transport App)
  • Affected Version: 2.7.18
  • Severity: Low
  • Short summary:

The app synchronizes data with a remote CouchDB server without proper server authentication. This allows man-in-the-middle attackers to manipulate the data shown in the app.


The app connects to using a plain HTTP connection. Since this connection is neither authenticated, nor integrity-protected, a man-in-the-middle attacker on the same network can easily inject rogue data. A simple DNS manipulation is sufficient to spoof a rogue database server and supply attacker-defined records

The app apparently uses the publicly-visible CouchDB for updating its own data via database replication. An attacker can inject new records, or modify and delete existing ones during this replication due to the missing transport security.


Disable the replication between the local database and CouchDB.

Suggested Mitigation

Always use TLS when communicating with remote services. Using a properly validated TLS connection ensures that the authenticity of the remote server and the integrity of the downloaded data.


  • 2017-02-27: Vulnerability Reported
  • 2017-03-13: Vulnerability Fixed