Thursday, March 28, 2024

OnePlus Phone Critical Security Vulnerability in Default Wallpapers app Leaks Users Email Address

A critical security flaw with OnePlus device wallpaper app Shot on OnePlus leaks hundreds of user’s email address. The flaw resides in the API that used to host the photos.

The Shot on OnePlus is an application used to access photos uploaded by OnePlus users, allowing them to set wallpaper and to upload photos from the app or through the website.

9to5Google reported the bug in the API that facilitates the connectivity between the server and the OnePlus app. The API hosted on open.oneplus.net is insecure and can be accessed by anyone who has the access token.

The API is mainly used to get public photos, but the response obtained through API used by onePlus exposes sensitive data that should not be accessed publically.

It exposes the photo details, including photo code, author, email, focal-length, photo topic, uploaded location, and the uploaded time. It is unclear for how long the app is leaking the details; 9to5Google believes that it was leaking the data since its release.

Another critical vulnerability with the leak is the OnePlus gid which used to identify the user; the gid is an alphanumeric code which is used by OnePlus’s API to find photos added by the user.

The first part of the gid represents “user is from China (CN) or somewhere else (EN)” and the second part is the “unique number, like 123456”, which is easily guessable by cycling through random numbers.

9to5Google contacted OnePlus about the issue, but they haven’t received any direct responses, anyhow OnePlus made changes to the API, and for gid flaw, they added validation strings to make sure is only used by the Shot on OnePlus app, and now they obscure the email address by adding asterisks.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

OnePlus 7 Pro Fingerprint Scanner Hacked In a Minutes Using a Fake Fingerprint

OnePlus 6 Bootloader Vulnerability Could allow Boot any Image even the Bootloader is Locked

OnePlus Website Hacked and Attackers Stolen Many Customers Credit Card Details

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles