• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical oauth vulnerability in expo framework allows account hijacking

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

You are here: Home / General Cyber Security News / Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking
May 27, 2023

A critical security vulnerability has been disclosed in the Open up Authorization (OAuth) implementation of the software development framework Expo.io.

The shortcoming, assigned the CVE identifier CVE-2023-28131, has a severity ranking of 9.6 on the CVSS scoring procedure. API security firm Salt Labs said the issue rendered expert services applying the framework prone to credential leakage, which could then be applied to hijack accounts and siphon sensitive knowledge.

Less than specified conditions, a threat actor could have taken benefit of the flaw to perform arbitrary steps on behalf of a compromised consumer on various platforms this sort of as Fb, Google, or Twitter.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Expo, equivalent to Electron, is an open supply platform for creating universal indigenous apps that operate on Android, iOS, and the web.

It truly is well worth noting that for the attack to be successful, web sites and apps working with Expo should really have configured the AuthSession Proxy setting for one signal-on (SSO) employing a third-party service provider these as Google and Facebook.

Set in different ways, the vulnerability could be leveraged to send out the key token associated with a indication-in provider (e.g., Fb) to an actor-managed area and use it to seize control of the victim’s account.

This, in transform, is accomplished by tricking the targeted person into clicking on a specifically crafted backlink that could be despatched by using classic social engineering vectors like email, SMS messages, or a doubtful web page.

Expo, in an advisory, stated it deployed a hotfix within just hrs of liable disclosure on February 18, 2023. It is really also advisable that end users migrate from making use of AuthSession API proxies to directly registering deep website link URL strategies with third-party authentication vendors to help SSO functions.

Vulnerability

“The vulnerability would have permitted a probable attacker to trick a person into browsing a destructive link, logging in to a third-party auth service provider, and inadvertently revealing their 3rd-party auth credentials,” Expo’s James Ide reported.

“This was due to the fact auth.expo.io utilised to shop an app’s callback URL before the user explicitly verified they believe in the callback URL.”

Forthcoming WEBINARZero Believe in + Deception: Learn How to Outsmart Attackers!

Discover how Deception can detect state-of-the-art threats, quit lateral movement, and improve your Zero Trust system. Join our insightful webinar!

Save My Seat!

The disclosure follows the discovery of equivalent OAuth issues in Reserving.com (and its sister site Kayak.com) that could have been leveraged to acquire manage of a user’s account, gain entire visibility into their private or payment-card details, and conduct actions on the victim’s behalf.

The results also occur weeks after Swiss cybersecurity enterprise Sonar in-depth a route traversal and an SQL injection flaw in the Pimcore enterprise content material management method (CVE-2023-28438) that an adversary can abuse to run arbitrary PHP code on the server with the permissions of the webserver.

Sonar, back in March 2023, also disclosed an unauthenticated, saved cross-web site scripting vulnerability impacting LibreNMS versions 22.10. and prior that could be exploited to acquire remote code execution when Very simple Network Administration Protocol (SNMP) is enabled.

Discovered this posting exciting? Observe us on Twitter  and LinkedIn to examine additional unique written content we post.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «severe flaw in google cloud's cloud sql service exposed confidential Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
Next Post: New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets new stealthy bandit stealer targeting web browsers and cryptocurrency wallets»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.