Therefore I reverse engineered two dating apps.

Therefore I reverse engineered two dating apps.

And I also got a zero-click session hijacking as well as other enjoyable weaknesses

In this post I reveal a few of my findings through the reverse engineering for the apps Coffee Meets Bagel as well as the League. We have identified several critical weaknesses throughout the research, all of these have now been reported into the affected vendors.


During these unprecedented times, increasing numbers of people are escaping to the world that is digital handle social distancing. Of these times cyber-security is more essential than ever before. From my limited experience, really few startups are mindful of security guidelines. The businesses accountable for a range that is large of apps are no exclusion. We began this small scientific study to see exactly just how secure the latest relationship apps are.

Accountable disclosure

All severity hookup prices that is high disclosed in this article have now been reported into the vendors. Because of the period of publishing, matching patches have already been released, and I also have actually separately verified that the fixes come in destination.

I shall maybe maybe maybe not offer details in their APIs that is proprietary unless.

The prospect apps

We picked two popular apps that are dating on iOS and Android os.

Coffee Suits Bagel

Coffee suits Bagel or CMB for brief, launched in 2012, is well known for showing users a number that is limited of each and every day. They’ve been hacked as soon as in 2019, with 6 million records taken. Leaked information included a name that is full current email address, age, enrollment date, and sex. CMB happens to be popularity that is gaining modern times, and makes a beneficial prospect because of this task.

The League

The tagline for The League software is intelligently” that is“date. Launched a while in 2015, it’s a members-only software, with acceptance and fits centered on LinkedIn and Twitter pages. The application is more high priced and selective than its options, it is protection on par because of the cost?

Testing methodologies

I personally use a mix of fixed analysis and powerful analysis for reverse engineering. For fixed analysis we decompile the APK, mostly utilizing apktool and jadx. For powerful analysis an MITM is used by me system proxy with SSL proxy capabilities.

A lot of the screening is completed in the rooted Android emulator operating Android os 8 Oreo. Tests that need more capabilities are done on an actual Android os device operating Lineage OS 16 (according to Android os Pie), rooted with Magisk.

Findings on CMB

Both apps have complete great deal of trackers and telemetry, but i suppose that is simply the state associated with the industry. CMB has more trackers compared to the League though.

See whom disliked you on CMB with this specific one trick that is simple

The API features a pair_action industry in almost every bagel item and it is an enum aided by the values that are following

There is certainly an API that offered a bagel ID returns the object that is bagel. The bagel ID is shown when you look at the batch of day-to-day bagels. Therefore if you’d like to see if somebody has rejected you, you can decide to try the next:

This will be a safe vulnerability, but it is funny that this industry is exposed through the API it is not available through the software.

Geolocation information drip, yet not actually

CMB shows other users’ longitude and latitude up to 2 decimal places, which can be around 1 square mile. Luckily this given info is maybe perhaps not real-time, which is just updated whenever a person chooses to upgrade their location. (we imagine this can be used by the software for matchmaking purposes. We have maybe perhaps not confirmed this theory.)

Nonetheless, i really do think this field might be concealed through the reaction.

Findings on The League

Client-side created verification tokens

The League does one thing pretty unusual within their login flow:

The UUID that becomes the bearer is completely client-side generated. even even Worse, the host will not validate that the bearer value is a genuine UUID that is valid. It might cause collisions along with other issues.

I suggest changing the login model therefore the token that is bearer created server-side and delivered to the client when the host gets the perfect OTP through the client.

Contact number drip through an unauthenticated API

When you look at the League there is an unauthenticated api that accepts a contact quantity as question parameter. The API leakages information in HTTP reaction code. Once the telephone number is registered, it comes back 200 okay , but once the quantity is certainly not registered, it comes back 418 we’m a teapot . Maybe it’s mistreated in a couple of means, e.g. mapping all the true figures under a place rule to see that is from the League and who’s perhaps maybe not. Or it may result in prospective embarrassment whenever your coworker realizes you’re on the application.

This has since been fixed once the bug ended up being reported into the merchant. Now the API merely returns 200 for several demands.

LinkedIn job details

The League integrates with LinkedIn to exhibit a user’s boss and work name to their profile. Often it goes a bit overboard collecting information. The profile API comes back step-by-step work position information scraped from LinkedIn, such as the begin 12 months, end 12 months, etc.

Whilst the application does ask individual authorization to see LinkedIn profile, the consumer most likely doesn’t expect the step-by-step place information become contained in their profile for everyone to look at. I actually do perhaps perhaps not genuinely believe that type or form of info is required for the software to operate, and it will oftimes be excluded from profile information.

Skriv et svar

Din e-mailadresse vil ikke blive publiceret.

scroll to top