• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical oauth vulnerability in expo framework allows account hijacking

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

You are here: Home / General Cyber Security News / Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking
May 27, 2023

A critical security vulnerability has been disclosed in the Open up Authorization (OAuth) implementation of the software development framework Expo.io.

The shortcoming, assigned the CVE identifier CVE-2023-28131, has a severity ranking of 9.6 on the CVSS scoring procedure. API security firm Salt Labs said the issue rendered expert services applying the framework prone to credential leakage, which could then be applied to hijack accounts and siphon sensitive knowledge.

Less than specified conditions, a threat actor could have taken benefit of the flaw to perform arbitrary steps on behalf of a compromised consumer on various platforms this sort of as Fb, Google, or Twitter.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Expo, equivalent to Electron, is an open supply platform for creating universal indigenous apps that operate on Android, iOS, and the web.

It truly is well worth noting that for the attack to be successful, web sites and apps working with Expo should really have configured the AuthSession Proxy setting for one signal-on (SSO) employing a third-party service provider these as Google and Facebook.

Set in different ways, the vulnerability could be leveraged to send out the key token associated with a indication-in provider (e.g., Fb) to an actor-managed area and use it to seize control of the victim’s account.

This, in transform, is accomplished by tricking the targeted person into clicking on a specifically crafted backlink that could be despatched by using classic social engineering vectors like email, SMS messages, or a doubtful web page.

Expo, in an advisory, stated it deployed a hotfix within just hrs of liable disclosure on February 18, 2023. It is really also advisable that end users migrate from making use of AuthSession API proxies to directly registering deep website link URL strategies with third-party authentication vendors to help SSO functions.

Vulnerability

“The vulnerability would have permitted a probable attacker to trick a person into browsing a destructive link, logging in to a third-party auth service provider, and inadvertently revealing their 3rd-party auth credentials,” Expo’s James Ide reported.

“This was due to the fact auth.expo.io utilised to shop an app’s callback URL before the user explicitly verified they believe in the callback URL.”

Forthcoming WEBINARZero Believe in + Deception: Learn How to Outsmart Attackers!

Discover how Deception can detect state-of-the-art threats, quit lateral movement, and improve your Zero Trust system. Join our insightful webinar!

Save My Seat!

The disclosure follows the discovery of equivalent OAuth issues in Reserving.com (and its sister site Kayak.com) that could have been leveraged to acquire manage of a user’s account, gain entire visibility into their private or payment-card details, and conduct actions on the victim’s behalf.

The results also occur weeks after Swiss cybersecurity enterprise Sonar in-depth a route traversal and an SQL injection flaw in the Pimcore enterprise content material management method (CVE-2023-28438) that an adversary can abuse to run arbitrary PHP code on the server with the permissions of the webserver.

Sonar, back in March 2023, also disclosed an unauthenticated, saved cross-web site scripting vulnerability impacting LibreNMS versions 22.10. and prior that could be exploited to acquire remote code execution when Very simple Network Administration Protocol (SNMP) is enabled.

Discovered this posting exciting? Observe us on Twitter  and LinkedIn to examine additional unique written content we post.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «severe flaw in google cloud's cloud sql service exposed confidential Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
Next Post: New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets new stealthy bandit stealer targeting web browsers and cryptocurrency wallets»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.