SIK-2017-042
Title:
SQLi in Picture Cloud from CoupleVow App
Report ID
SIK-2017-042
Summary:
- Vendor: 애펙스 주식회사
- Product: Couple Vow (Package-Name: com.ms.coupleobserver)
- Affected Version: 3.0.2
- Severity: medium
- Short summary: Accessing all pictures form all users via SQLi.
Details:
The app allows to share pictures between two users. Only these users shall have access to the pictures. For accessing your pictures, the app sends a request to a cloud service with the names of the two users. Just by giving the names, the cloud returns the pictures. By knowing the names of two connected users, an adversary can access their pictures.
Even worse, the webpage is also vulnerable against an SQL injection attack, which allows an attacker to access every picture from every user:
http://*****/*****/*****/******/index.php?page=5&name=' or ''='&name2=test
Workaround
–
Suggested Mitigation
There needs to be a proper input sanitization. More details can be found at https://www.owasp.org/index.php/Data_Validation
Timeline
- 2017-08-09 Vulnerability Discovered
- 2017-08-09 Contacted developer
- 2018-08-11 Published