Saturday, February 23, 2019

The Bounty Hunter Anand Prakash – Bug Bounty Hunter does it again
Anand Prakash and his colleague at it again managed to unveil the essential API related vulnerability which led to the leakage of client secret and server tokens of all Uber developer applications. Anand Prakash – bug bounty hunter does it again
Anand Prakash, AppSecure is a top-ranked hacker to be precise 4th worldwide and 1st in India on Uber’s bug bounty program. He has earned more than 25 lakhs approx $35000 till date from Uber alone. This is not the first time the bug bounty hunter is doing it either, earlier in 2018 he managed to identify an issue on Tinder allowing them to login into any tinder account.
The bug bounty hunter is also ranked 3rd worldwide and 1st in India on Twitters bug bounty program.
AppSecure led by Anand Prakash and Manisha Sangwan managed to identify an essential API flaw which led to leakage of client secret and server tokens of all Uber developer applications.
According to internet reports, the issue was scrutinized by the Uber engineering team and rewarded them with 3.5 lakhs INR (5000 USD) bounty.
The hackers were able to use the vulnerability which pointed out particularly on riders. Uber within which they could point out public API endpoints of https://riders.uber.com/ . Which the hackers used to see client secret of all Uber applications, the issue has been resolved by Uber by removing the extra response from the API response.

The Uber documentation says:The secret for your application, this should be treated like your application’s password. Never share this with anyone, check this into source code, or post in any public forum. Additionally, this should not be distributed on client devices where users could decompile your code and access the secret. If you suspect your client secret has been compromised you may generate a new one in your application’s dashboard which will immediately invalidate the old secret.
The hackers used to exploit this issue by connecting to any Uber application with his Uber account. Navigate to the vulnerable endpoint to see the leaked data in API response.
How the exploit worked step-by-step
Step #1
Hacker connects to a random Uber developer application to his account using OAuth. IFTTT, Pay fare, Bixby are some of the examples of Uber developer applications. It is not identified as a complicated procedure as of now.
Step #2
Once the hackers connects with the above apps to his Uber account which he/she can use against endpoint to get the developer application’s confidential data. The other significant information of the application using the attacker’s session data.
The vulnerability was reported to Uber on 5th October 2018 by Anand Prakash and Uber agreed to publicly disclose it on February 8th, 2019.

1 comment:

  1. I am a Single full time dad on disability getting no help from their moms. It a struggle every day. My boys are 15 and 9 been doing this by myself for 8 years now it’s completely drained all my savings everything . These guys are the present day ROBIN HOOD. Im back on my feet again and my kids can have a better life all thanks to the blank card i acquired from skylink technology. Now i can withdraw up too 3000 per day Contact them as well on Mail: skylinktechnes@yahoo.com   or   whatsspp/telegram: +1(213)785-1553

    ReplyDelete

FARDC and Wazalendo claim that many M23 have been neutralized and several villages liberated .

This Saturday 21/12/24 the village of KANYAMBI, a major stronghold of the M23_RDF in the Lubero territory was retaken by the Congolese army ...