exploit the possibilities

USAA Mobile App Information Disclosure

USAA Mobile App Information Disclosure
Posted Jan 23, 2015
Authored by David Longenecker

The USAA Mobile app for Android versions prior to 7.10.1 suffer from an information disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 114a564976eb69af6c39e9a8665e45ec

USAA Mobile App Information Disclosure

Change Mirror Download
The USAA Mobile app for Android, prior to version 7.10.1 (released 19
January), contains an information disclosure vulnerability. I have
submitted a CVE-Assign request for this issue but do not yet have a CVE
assigned. The issue is demonstrated with sanitized screen captures at
http://dnlongen.blogspot.com/CVE-2015-USAA

By design, the USAA Mobile app for Android allows users to select whether
to log out immediately upon task-switching (i.e. being interrupted by a
phone call or notification), or to stay logged in for up to 20 minutes.

When "Stay logged in" is enabled however, versions prior to 7.10.1 display
the last-viewed screen *before* prompting the user to log back in. If that
last screen contained sensitive information, such as account numbers and
balances, it becomes possible for one to obtain this information without
authorization. Whether it were 20 minutes later, or a week later, launching
the USAA mobile app would show personal information briefly before blanking
the screen and prompting for a password or PIN.

I would not consider this a severe risk. It cannot be exploited by a remote
attacker - it requires physical access to the mobile device. It also
requires that the attacker is able to log in to the Android device, or that
the device lacks a password-protected lockscreen. I have not found it
possible to take any action without authenticating - the screen is shown
for perhaps a second or two before a login prompt appears. Nonetheless, it
is an unauthenticated information disclosure issue with the app.

With the 7.10.1 version, instead of seeing a screen full of personal
information, the app opens to a benign menu that has no personal
information. Upon choosing a menu option that would show private data, the
user is prompted to log in before any data is shown.

--

Regards,
David Longenecker
@dnlongen


Login or Register to add favorites

File Archive:

March 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    19 Files
  • 2
    Mar 2nd
    15 Files
  • 3
    Mar 3rd
    30 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close