How we discovered TeaOnHer spilling customers’ driver’s licenses in lower than 10 minutes | TechCrunch

Date:

For an app all about spilling the beans on who you’re allegedly relationship, it’s ironic that TeaOnHer was spilling the non-public data of hundreds of its customers to the open net.

TeaOnHer was designed for males to share images and details about girls they declare to have been relationship. However very like Tea, the dating-gossip app for girls it was attempting to duplicate, TeaOnHer had gaping holes in its safety that uncovered its customers’ private data, together with images of their driver’s licenses and different government-issued identification paperwork, as TechCrunch reported final week.

These gated community-like apps have been created ostensibly to let customers share details about their relationships underneath the guise of non-public security. Nevertheless, shoddy coding and safety flaws spotlight the continued privateness dangers inherent in requiring customers to submit delicate data to make use of apps and web sites.

Such dangers are solely going to worsen; common apps and net providers are already having to adjust to age verification legal guidelines that require folks to submit their identification paperwork earlier than they are often granted entry to adult-themed content material, regardless of the privateness and safety dangers related to storing databases of individuals’s private data.

When TechCrunch revealed our story final week, we didn’t publish particular particulars of the bugs we found in TeaOnHer, erring on the aspect of warning in order to not assist unhealthy actors exploit the bug. As a substitute, we determined to publish a restricted disclosure, due to the app’s rising recognition and the quick dangers that customers confronted when utilizing the app.

As of the time of disclosure, TeaOnHer was #2 within the free app charts on the Apple App Retailer, a place nonetheless held by the app in the present day.

The issues we discovered look like resolved. TechCrunch can now share how we have been capable of finding customers’ driver’s licenses inside 10 minutes of being despatched a hyperlink to the app within the App Retailer, due to straightforward to seek out flaws within the app’s public-facing backend system, or API.

The app’s developer, Xavier Lampkin, didn’t reply to a number of requests for remark after we submitted particulars of the safety flaws, nor would Lampkin decide to notifying affected TeaOnHer customers or state regulators of the safety lapse.

We additionally requested Lampkin if any safety opinions have been carried out earlier than the TeaOnHer app was launched, however we obtained no reply. (We’ve extra on disclosure in a while.)

Alright, begin the clock.

TeaOnHer uncovered ‘admin panel’ credentials

Earlier than we even downloaded the app, we first needed to seek out out the place TeaOnHer was hosted on the web by taking a look at its public-facing infrastructure, akin to its web site and something hosted on its area.

That is normally a superb place to start out because it helps perceive what different providers the area is linked to on the web. 

To seek out the area identify, we first seemed (by probability) on the app’s itemizing on the Apple App Retailer to seek out the app’s web site. This may normally be present in its privateness coverage, which apps should embody earlier than Apple will checklist them. (The app itemizing additionally claims the developer “does not collect any data from this app,” which is demonstrably false, so take that as you’ll.)

TeaOnHer’s privateness coverage was within the type of a printed Google Doc, which included an electronic mail deal with with a teaonher.com area, however no web site.

The web site wasn’t public on the time, so with no web site loading, we seemed on the area’s public-facing DNS information, which may also help to establish what else is hosted on the area, akin to the kind of electronic mail servers or internet hosting. We additionally needed to search for any public subdomains that the developer would possibly use to host performance for the app (or host different assets that ought to most likely not be public), akin to admin dashboards, databases, or different web-facing providers.

However after we seemed on the TeaOnHer’s public web information, it had no significant data aside from a single subdomain, appserver.teaonher.com.

After we opened this web page in our browser, what loaded was the touchdown web page for TeaOnHer’s API (for the curious, we uploaded a duplicate right here). An API merely permits issues on the web to speak with one another, akin to linking an app to its central database.

It was on this touchdown web page that we discovered the uncovered electronic mail deal with and plaintext password (which wasn’t that far off “password”) for Lampkin’s account to entry the TeaOnHer “admin panel.”

The API web page confirmed that the admin panel, used for the doc verification system and person administration, was positioned at “localhost,” which merely refers back to the bodily laptop operating the server and will not have been straight accessible from the web. It’s unclear if anybody might have used the credentials to entry the admin panel, however this was in itself a sufficiently alarming discovering.

At this level, we have been solely about two minutes in.

In any other case, the API touchdown web page didn’t do a lot aside from provide some indication as to what the API can do. The web page listed a number of API endpoints, which the app must entry as a way to perform, akin to retrieving person information from TeaOnHer’s database, for customers to go away opinions, and sending notifications.

With data of those endpoints, it may be simpler to work together with the API straight, as if we have been imitating the app itself. Each API is completely different, so studying how an API works and tips on how to talk with one can take time to determine, akin to which endpoints to make use of and the parameters wanted to successfully converse its language. Apps like Postman could be useful for accessing and interacting straight with APIs, however this requires time and a sure diploma of trial and error (and endurance) to make APIs spit out information after they shouldn’t.

However on this case, there was a fair simpler means. 

TeaOnHer API allowed unauthenticated entry to person information

This API touchdown web page included an endpoint known as /docs, which contained the API’s auto-generated documentation (powered by a product known as Swagger UI) that contained the total checklist of instructions that may be carried out on the API. 

This documentation web page was successfully a grasp sheet of all of the actions you may carry out on the TeaOnHer API as an everyday app person, and extra importantly, because the app’s administrator, akin to creating new customers, verifying customers’ identification paperwork, moderating feedback, and extra. 

The API documentation additionally featured the power to question the TeaOnHer API and return person information, basically letting us retrieve information from the app’s backend server and show it in our browser.

Whereas it’s not unusual for builders to publish their API documentation, the issue right here was that some API requests might be made with none authentication — no passwords or credentials have been wanted to return data from the TeaOnHer database. In different phrases, you would run instructions on the API to entry customers’ personal information that ought to not have been accessible to a person of the app, not to mention anybody on the web. 

All of this was conveniently and publicly documented for anybody to see.

Requesting an inventory of customers presently within the TeaOnHer identification verification queue, for instance — not more than urgent a button on the API web page, nothing fancy right here — would return dozens of account information on individuals who had just lately signed as much as TeaOnHer.

The information returned from TeaOnHer’s server contained customers’ distinctive identifiers inside the app (basically a string of random letters and numbers), their public profile display screen identify, and self-reported age and site, together with their personal electronic mail deal with. The information additionally included net deal with hyperlinks containing images of the customers’ driver’s licenses and corresponding selfies. 

Worse, these images of driver’s licenses, government-issued IDs, and selfies have been saved in an Amazon-hosted S3 cloud server set as publicly accessible to anybody with their net addresses. This public setting lets anybody with a hyperlink to somebody’s identification paperwork open the information from wherever with no restrictions.

Two driver’s licenses (redacted by TechCrunch) uncovered by the issues within the TeaOnHer app.Picture Credit:TechCrunch (screenshot)

With that distinctive person identifier, we might additionally use the API web page to straight search for particular person customers’ information, which might return their account information and any of their related identification paperwork. With uninhibited entry to the API, a malicious person might have scraped enormous quantities of person information from the app, very like what occurred with the Tea app to start with.

From bean to cup, that was about 10 minutes, and we hadn’t even logged-in to the app but. The bugs have been really easy to seek out that it could be sheer luck if no person malicious discovered them earlier than we did.

We requested, however Lampkin wouldn’t say if he has the technical capacity, akin to logs, to find out if anybody had used (or misused) the API at any time to achieve entry to customers’ verification paperwork, akin to by scraping net addresses from the API.

Within the days since our report back to Lampkin, the API touchdown web page has been taken down, together with its documentation web page, and it now shows solely the state of the server that the TeaOnHer API is operating on as “healthy.” At the least on cursory checks, the API now seems to depend on authentication, and the earlier calls made utilizing the API not work. 

The online addresses containing customers’ uploaded identification paperwork have additionally been restricted from public view. 

TeaOnHer developer dismissed efforts to reveal flaws

On condition that TeaOnHer had no official web site on the time of our findings, TechCrunch contacted the e-mail deal with listed on the privateness coverage in an effort to reveal the safety lapses. 

However the electronic mail bounced again with an error saying the e-mail deal with couldn’t be discovered. We additionally tried contacting Lampkin by means of the e-mail deal with on his web site, Newville Media, however our electronic mail bounced again with the identical error message.

TechCrunch reached Lampkin through LinkedIn message, asking him to supply an electronic mail deal with the place we might ship particulars of the safety flaws. Lampkin responded with a basic “support” electronic mail deal with.

When TechCrunch discloses a safety flaw, we attain out to verify first that an individual or firm is the proper recipient. In any other case, blindly sending particulars of a safety bug to the mistaken individual might create a danger. Earlier than sharing particular particulars of the issues, we requested the recipient of the “support” electronic mail deal with if this was the proper deal with to reveal a safety publicity involving TeaOnHer person information.

“You must have us confused with ‘the Tea app’,” Lampkin replied by electronic mail. (We hadn’t.) “We don’t have a security breach or data leak,” he mentioned. (It did.) “We have some bots at most but we haven’t scaled big enough to be in that conversation yet, sorry you were misinformed.” (We weren’t.)

Glad that we had established contact with the proper individual (albeit not with the response we obtained), TechCrunch shared particulars of the safety flaws, in addition to a number of hyperlinks to uncovered driver’s licenses, and a duplicate of Lampkin’s personal information to underscore the severity of the safety points.

“Thank you for this information. This is very concerning. We are going to jump on this right now,” mentioned Lampkin.

Regardless of a number of follow-up emails, we’ve not heard from Lampkin since we disclosed the safety flaws.

It doesn’t matter should you’re a one-person software program store or a billionaire vibe coding by means of a weekend: Builders nonetheless have a duty to maintain their customers’ information secure. Should you can’t hold your customers’ personal information secure, don’t construct it to start with.

When you’ve got proof of a well-liked app or service leaking or exposing data, get in contact. You may securely contact this reporter through encrypted message at zackwhittaker.1337 on Sign.

Share post:

Subscribe

Latest Article's

More like this
Related