SIK-2017-041
Title:
SQLi in GPS Location Tracker App
Report ID
SIK-2017-041
Summary:
- Vendor: SeeBetaApp
- Product: Track My Family (Package-name: com.betaapp.myfamilylocator)
- Affected Version: 2.6
- Severity: high
- Short summary: SQLi in Login form breaks authentication
Details:
The backend provides a php file, which returns information about people belonging to your so called „family“.
With a GET parameter, the user sends its identifier and the backend selects the data accessible with this identifier.
As there is no other authentication required, an adversary can select an arbitrary phone number and gets data, which should only be accessible for the person with this identifier. Even worse, the GET parameters is prone to a SQL injection and therefore an adversary can access all data.
http://******/*****/fetch_family.php?mobile=' or '' ='
Workaround
–
Suggested Mitigation
There needs to be a proper input sanitization. More details can be found at https://www.owasp.org/index.php/Data_Validation
Timeline
- 2017-08-09 Vulnerability Discovered
- 2017-08-10 Contaced developer
- 2018-08-11 Published