The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
References
Link | Resource |
---|---|
https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 | Product |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 | Product |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 - Product | |
References | () https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory |
01 Dec 2022, 23:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sz-fujia:ourphoto:1.4.1:*:*:*:*:*:*:* | |
CWE | CWE-639 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://apps.apple.com/us/app/ourphoto-keep-our-memories/id1476241568 - Product | |
References | (MISC) https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory |
28 Nov 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-28 22:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24187
Mitre link : CVE-2022-24187
CVE.ORG link : CVE-2022-24187
JSON object : View
Products Affected
sz-fujia
- ourphoto
CWE
CWE-639
Authorization Bypass Through User-Controlled Key