Grindr

Grindr,  one of the world’s largest dating and social networking apps for gay, bi, trans, and queer people, reported a security vulnerability that allowed anyone to hijack and take control of any user’s account using only their email address.

Grindr’s password reset page was leaking password reset tokens to the browser, which meant anyone could trigger the password reset who had knowledge of a user’s registered email address, and collect the password reset token from the browser if they knew where to look.

Thus with that crafted link, the malicious user can reset the account owner’s password and gain access to their account and the personal data stored within, including account photos, messages, sexual orientation and HIV status and last test date.

Grindr addressed the issue and soon fixed it.

Source: https://techcrunch.com/2020/10/02/grindr-account-hijack-flaw/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&guce_referrer_sig=AQAAAD56MuOWe8TJ1nVqYpaMOLhSVoTDedod7FoDiBjbbfN2YP23uqBU04x4Gx6aI7TDekI5gnPDfKLcjKYQ4R5Od4_GnlRTv5aOnzZVkMYhSYre4nxr6YEawZOz-XyZ_sPDmeAP1W0eajJamjAdeOQElUpIigpU4mO2nw5ishw_O2al

"id": "GRI235631222",
"linkid": "grindr",
"type": "Vulnerability",
"date": "10/2020",
"severity": "60",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"