Apple iOS Starbucks App Users at Risk - BestCyberNews: Online News Presenter in the present world

BestCyberNews: Online News Presenter in the present world

Start knowing

test banner

Breaking

Apple iOS Starbucks App Users at Risk

Insecure Data Storage of User Data Elements in Starbucks v2.6.1 iOS mobile application. The problem comes from the way session.clslog, the Crashlytics log file, handles those credentials in the event of a crash.


Within session.clslog there are multiple instances of the storage of clear-text credentials that can be recovered and leveraged for unauthorized usage of a users account on the malicious users’ own device or online at https://www.starbucks.com/account/signin.
It contains the HTML of the mobile application page that performs the account login or account reset. session.clslog also contains the OAuth token (signed with HMAC-SHA1) and OAuth signature for the users account/device to the Starbucks service.


All references of 'CLEARTEXT' above are the cleartext values of each referenced string. 

To prevent sensitive user data (credentials) from being recovered by a malicious user, output sanitization should be conducted to prevent these data elements from being stored in the crashlytics log files in clear-text, if at all.




Author Venkatesh Yalagandula Follow us Google + and Facebook and Twitter

No comments:

Post a Comment