How I compromised Tinder profile using Facebook’s profile gear and won $6,250 in bounties

How I compromised Tinder profile using Facebook’s profile gear and won $6,250 in bounties

However this is becoming published utilizing the license of Twitter within the liable disclosure approach.

The vulnerabilities mentioned in this article are connected swiftly with the design groups of Twitter and Tinder.

This article talks about a merchant account takeover weakness i ran across in Tinder’s product. By exploiting this, an attacker might have gathered the means to access the victim’s Tinder levels, which needs made use of their particular phone number to log in.

This may have already been used through a weakness in Facebook’s levels package, which facebook or twitter has recently answered.

Both Tinder’s cyberspace and cellular apps allow users to utilize their particular cellular phone data to log into needed. Which connect to the internet service is actually furnished by levels set (Twitter).

Go Solution Provided With Facebook’s Accountkit on Tinder

The person clicks on go browsing with number on tinder.com following they might be rerouted to Accountkit.com for go online. When verification works after that profile package passes by the accessibility token to Tinder for go online.

Curiously, the Tinder API wasn’t checking out the customer ID regarding token furnished by profile gear.

This allowed the attacker to utilize other app’s availability token supplied by accounts set to consider along the real Tinder accounts of various other users.

Weakness Outline

Levels package are something of Facebook that helps people fast use and get on some authorized software through the help of merely their unique names and phone numbers or email address without needing a code. Truly trustworthy, user friendly, and gives the person options on how they want to sign up for apps.

Tinder is a location-based cellular software for searching and encounter other people. You are able to individuals to like or object to more consumers, thereafter proceed to a chat if each party swiped ideal.

There’s a vulnerability in membership set through which an assailant might have attained having access to any user’s Account equipment account just by making use of their phone number. (suite…)

Continuer la lectureHow I compromised Tinder profile using Facebook’s profile gear and won $6,250 in bounties