The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
References
Link | Resource |
---|---|
https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 | Product |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 | Product |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 - Product | |
References | () https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2022-11-28 22:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24187
Mitre link : CVE-2022-24187
CVE.ORG link : CVE-2022-24187
JSON object : View
Products Affected
sz-fujia
- ourphoto
CWE
CWE-639
Authorization Bypass Through User-Controlled Key