-
coinza-c7e97-firebase-adminsdk-ok3f8-df3457e3e8.json
: This is a configuration file for a Firebase project and it includes a private key that the developers were using to connect with the Firebase backend services.- The problem: Sometimes developers don't realize that any file they embed with the app will be easily extracted by anyone. In this case this configuration file gives attackers all the information they need to impersonate a legitimate access to the company's Firebase backend services and data.
- Recommended fix: This configuration file is supposed to be stored in a backend server, not in a client application. What the developers need to do is to add an authentication flow in the client side and that lets the app authenticate with their own backend server and then have that backend server connect to Firebase.
- Note: I found a similar configuration file on a popular VPN application and when I reported it to the company they replied saying their Firebase project was not being used anymore and that's why they didn't feel the need to remove the configuration file, I did not use the private key to connect to their Firebase backend and verify if it was valid.
-
SQLCIPHER_KEY
: A hard-coded secret key in the application's info.plist file, this is the secret key used for the application's SQLCipher to encrypt its database contents.- The problem: Even though the developers were thinking about protecting their users' generated content by encrypting the database, they did so by hard-coding a secret key that all installations of their app would use. This is a little bit harder to exploit but if an attacker is able to, for example, get a hold of users' not encrypted iTunes backups, they will be able to decrypt the databases because all databases are using the same secret key.
- Recommended fix: Generate a secret key per installation and store it in the iOS keychain, this way attackers would have to compromise the devices of every victim and that's a considerable harder attack.
-
NSAllowsArbitraryLoads
: Disables App Transport Security (aka ATS), allowing week TLS configurations.- The problem: Apple introduced ATS to protect users from week and vulnerable TLS configurations, disabling this feature means that this application puts the security and privacy of the end user at risk.
- Recommended fix: Remove this key from the
Info.plist
and work with the backend engineers to update the servers' TLS configuration.
-
CFBundleURLTypes
: Having customScheme URLs
is not an issue, but it means this app can be launched by other applications using thecoinza://
scheme URL and it probably takes some parameters with it. Just take a note about this feature, it will be helpful on the next module's exercises. -
AFNetworking 2.5.1
: This version of the popular frameworkAFNetworking
had a serious vulnerability that allowed attackers to perform Man-in-the-Middle (aka MitM) attacks on any application using any version <= 2.5.1 of this framework that was not using SSL pinning.- The problem: Even though 3rd party frameworks help developers by saving time and resources, because they don't need to build that functionality themselves, they can introduce vulnerabilities and the developer has to wait until a patch is made available. In this case the authors of the frameworks acted quickly and released a patched version (though it was not a complete fix) but all the applications had to be updated and re-submitted to the App Store and then users had to update their apps on their devices. This process takes a lot of time from patch to updating the end user. Every time you are about to add a 3rd party framework, think about this and consider if the framework is really needed. Even if you don't introduce a vulnerability yourself, the moment you include a 3rd party framework on your application it becomes your responsibility.
- Recommended fix: The fix is relatively simple, just update the framework. But the real recommendation is to use the minimum amount of 3rd party frameworks on your applications. I try to use the built-in frameworks that Apple provides before exploring a 3rd party option.
[^1] Since I love pizza, most of the things I do involve pizza. Hence the Pizza-based cryptocurrency CoinZa
.