The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
References
Link | Resource |
---|---|
https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 | Product |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-11-28T00:00:00
Updated: 2022-11-28T00:00:00
Reserved: 2022-01-31T00:00:00
Link: CVE-2022-24187
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-28T22:15:10.413
Modified: 2022-12-01T23:21:12.743
Link: CVE-2022-24187
JSON object: View
Redhat Information
No data.
CWE