IDOR on Ios Application
A friend asked me to do a pentest for their company,A Kenyan fintech company.For obvious reasons i cannot name the company. Everything was to be audited(sites,android and ios apps)
After looking at the websites i couldn't find anything interesting except for enabled xmrplc,broken links hijacking and some unrestricted directories. I even tried scanning the site with wpscan.WordPress sucks!
As a newbie ios pentester i decided to challenge myself to find atleast one bug on their app.After downloading the app from the appstore i proxied the iphone to burpsuite.As static analysis of ios app is tiresome and not straightforward as android(just unpacking the apk file which is basically zip file) i opted for dynamic analysis.The procedure of setting up proxy in ios is the same as on android,just set ip address and port then install burp certificate. Fortunately ,No ssl pinning :)
I started by signing up on the app.I received the confirmation email and my 4 numbers PIN.I then tried bruteforcing the PIN as 4 number PINs are insecure(only 10,000 possible combinations).sadly after 4 failed tries the account gets locked
after sorting out locked out issue,i logged in and checked burpsuite for profile details traffic and to my shock there was an id parameter.
I just changed my Id by adding one to the last character and when i checked the response tab i saw another customer details(phone number,name,balance).
The screenshot shows the request and response.
So what's the most critical thing i could do, why not try withdrawing as the IDOR bug gave my full access to other users accounts?. I could even change their PIN.
I tried withdrawing but could find withdrawal button so i was left disappointed
Comments
Post a Comment