CVE-2022-24187

The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sz-fujia:ourphoto:1.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:49

Type Values Removed Values Added
References () https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 - Product () https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 - Product
References () https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory () https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory

Information

Published : 2022-11-28 22:15

Updated : 2024-11-21 06:49


NVD link : CVE-2022-24187

Mitre link : CVE-2022-24187

CVE.ORG link : CVE-2022-24187


JSON object : View

Products Affected

sz-fujia

  • ourphoto
CWE
CWE-639

Authorization Bypass Through User-Controlled Key