Grindr

Grindr

Grindr,  one of the world’s largest dating and social networking apps for gay, bi, trans, and queer people, reported a security vulnerability that allowed anyone to hijack and take control of any user’s account using only their email address.

Grindr’s password reset page was leaking password reset tokens to the browser, which meant anyone could trigger the password reset who had knowledge of a user’s registered email address, and collect the password reset token from the browser if they knew where to look.

Thus with that crafted link, the malicious user can reset the account owner’s password and gain access to their account and the personal data stored within, including account photos, messages, sexual orientation and HIV status and last test date.

Grindr addressed the issue and soon fixed it.

Source: https://techcrunch.com/2020/10/02/grindr-account-hijack-flaw/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&guce_referrer_sig=AQAAAD56MuOWe8TJ1nVqYpaMOLhSVoTDedod7FoDiBjbbfN2YP23uqBU04x4Gx6aI7TDekI5gnPDfKLcjKYQ4R5Od4_GnlRTv5aOnzZVkMYhSYre4nxr6YEawZOz-XyZ_sPDmeAP1W0eajJamjAdeOQElUpIigpU4mO2nw5ishw_O2al

TPRM report: https://scoringcyber.rankiteo.com/company/grindr

"id": "gri235631222",
"linkid": "grindr",
"type": "Vulnerability",
"date": "10/2020",
"severity": "60",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Dating and Social Networking',
                        'name': 'Grindr',
                        'type': 'Company'}],
 'attack_vector': 'Password Reset Token Leak',
 'data_breach': {'personally_identifiable_information': True,
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Account Photos',
                                              'Messages',
                                              'Sexual Orientation',
                                              'HIV Status',
                                              'Last Test Date']},
 'description': 'Grindr, one of the world’s largest dating and social '
                'networking apps for gay, bi, trans, and queer people, '
                'reported a security vulnerability that allowed anyone to '
                'hijack and take control of any user’s account using only '
                'their email address. Grindr’s password reset page was leaking '
                'password reset tokens to the browser, which meant anyone '
                'could trigger the password reset who had knowledge of a '
                'user’s registered email address, and collect the password '
                'reset token from the browser if they knew where to look. Thus '
                'with that crafted link, the malicious user can reset the '
                'account owner’s password and gain access to their account and '
                'the personal data stored within, including account photos, '
                'messages, sexual orientation and HIV status and last test '
                'date. Grindr addressed the issue and soon fixed it.',
 'impact': {'data_compromised': ['Account Photos',
                                 'Messages',
                                 'Sexual Orientation',
                                 'HIV Status',
                                 'Last Test Date']},
 'motivation': 'Unauthorized Access',
 'post_incident_analysis': {'corrective_actions': 'Fixed the password reset '
                                                  'token leak',
                            'root_causes': 'Password Reset Token Leak'},
 'title': 'Grindr Account Hijacking Vulnerability',
 'type': 'Account Hijacking',
 'vulnerability_exploited': 'Password Reset Token Leak'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.