Therefore I reverse engineered two apps that are dating.

Therefore I reverse engineered two apps that are dating.

Image and video clip drip through misconfigured S3 buckets

Typically for photos or any other asserts, some form of Access Control List (ACL) is in position. A common way of implementing ACL would be for assets such as profile pictures

The main element would act as a “password” to get into the file, in addition to password would simply be offered users who require use of the image. When it comes to an app that is dating it’s going to be whoever the profile is presented to.

I’ve identified several misconfigured buckets that are s3 The League throughout the research. All photos and videos are unintentionally made general general general public, with metadata such as which user uploaded them so when. Generally the application would obtain the pictures through Cloudfront, a CDN on top associated with the S3 buckets. Unfortunately the s3 that is underlying are severely misconfigured.

Side note: as much as i can inform, the profile UUID is arbitrarily produced server-side if the profile is done. Continue lendo