←back to thread

560 points bearsyankees | 1 comments | | HN request time: 0.882s | source
Show context
shayanbahal ◴[] No.43966407[source]
I had a similar experience with another dating app, although they never got back to me. When I tried to get the founders attention by changing his bio to contact me text, they restored a backup lol

years later I saw their instagram ad and tried to see if the issue still exists, and yes it did. Basically anyone with the knowledge of their API endpoints (which is easy to find using the app-proxy-server) you have full on admin capabilities and access to all messages, matching, etc.

I wonder if I should go back and try again... :-?

replies(1): >>43966635 #
cobalt60 ◴[] No.43966635[source]
Why not disclose it as a responsible dev with contacts and move on.
replies(1): >>43966771 #
pixl97 ◴[] No.43966771[source]
If a company is not responsible enough to follow up on security reports you should not follow up, but instead disclose it to the world.
replies(3): >>43966951 #>>43966972 #>>43968390 #
1. flutas ◴[] No.43966972[source]
tbh, I agree.

I've sent 2 big bugs like this, one Funimation and one for a dating app.

Funimation you could access anyones PII and shop orders, they ignored me until I sent a linkedin message to their CTO with his PII (CC number) in it.

The "dating" app well they were literally spewing private data (admin/mod notes, reports, private images, bcrytped password, ASIN, IP, etc) via a websocket on certain actions. I figured out those actions that triggered it, emailed them and within 12 hours they had fixed it and made a bug bounty program to pay me out of as a thank you.

Importantly, I also didn't use anyone else's data/account, I simply made another account that I attacked to prove. Yes it cost me a monthly sub ~$10 to do so. But they also refunded that.