Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    46 Important Account-Based Marketing Statistics for the Modern Marketer

    Motion Picture Association will work with Congress to start blocking piracy websites in the United States

    Excellent Support Guide: Unlock Cloud Success

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Fertility tracker Glow fixes bug that exposed user profiles
    Technology

    Fertility tracker Glow fixes bug that exposed user profiles

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    A bug in the online forums of fertility tracking app Glow exposed the personal data of about 25 million users, according to a security researcher.

    The vulnerability exposed the user’s first and last name, self-reported age group (such as children 13-18, adults 19-25, and 26 and older), the user’s self-described location, and the application’s unique user identifier (within Glow’s software platform) and any user-uploaded images, such as profile photos.

    Security researcher Ovi Liber told TechCrunch that he discovered user data leaked from Glow’s developer API. Liber reported the bug to Glow in October, and said Glow fixed the vulnerability about a week later.

    APIs allow two or more Internet-connected systems to communicate with each other, such as a user’s application and the application’s backend server. APIs can be public, but companies with sensitive data often restrict access to their own employees or trusted third-party developers.

    However, Liber said that anyone can access Glow’s API because he is not a developer.

    An unnamed Glow representative confirmed to TechCrunch that the bug has been fixed, but Glow declined to discuss the bug and its impact on records, or provide the representative’s name. Therefore, TechCrunch will not publish Glow’s response.

    Liber wrote in a blog post published on Monday that the vulnerability he discovered affected all of Glow’s 25 million users. Liber told TechCrunch that accessing the data is relatively easy.

    contact us

    Do you have more information about similar flaws in fertility tracking apps? We’d love to hear from you. On non-work devices, you can contact Lorenzo Franceschi-Bicchierai securely via Signal (phone +1 917 257 1382) or via Telegram, Keybase and Wire @lorenzofb or email lorenzo@techcrunch.com. You can also contact TechCrunch through SecureDrop.

    “My Android device is basically the same as [network analysis tool] Burp was wandering around the forum and saw API calls returning user data. This is where I discovered IDOR. Liber said, referring to a vulnerability in which servers lack proper checks to ensure access is only granted to authorized users or developers. “They said it should only be used by developers, [it’s] It’s not true that it’s a public API endpoint that returns data for each user – it’s just that the attacker needs to know how the API call is made. “

    While the leaked data may not appear to be extremely sensitive, digital security experts believe Glow users should know that the information is accessible.

    “I think it’s a big deal,” Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, a digital rights nonprofit, told TechCrunch of Liber’s research. “Even without discussing what is and is not [private identifiable information] Under this legal regime, people who use Glow might seriously reconsider their use if they knew that Glow was leaking data about them. “

    Launched in 2013, Glow describes itself as “the world’s most comprehensive period tracker and fertility app” that people can use to track their “menstrual cycle, ovulation and fertility signs, all in one place.”

    In 2016, Consumer Reports found that privacy vulnerabilities in the way the app allowed couples to link accounts and share data allowed access to Glow users’ data and comments about their sex lives, miscarriages, abortions, and more. . In 2020, Glow agreed to pay a $250,000 fine following an investigation by California’s attorney general, who accused the company of failing to “adequately safeguard [users’] Health Information” and “Allow access to user information without user consent.”

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Here are all the 2024 Oscar winners

    Watch Billie Eilish & Barbie Win 2024 Oscar for Best Original Song for “What Was I Made For”

    Halloween TV show will have its own classic

    ‘Weird’ Comments: Your new horror obsession has arrived

    NFT fantasy sports startup Sorare lays off 13% of employees as web3 games struggle

    Best Salesforce Training Package Discount: 91% Off

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    46 Important Account-Based Marketing Statistics for the Modern Marketer

    Motion Picture Association will work with Congress to start blocking piracy websites in the United States

    Excellent Support Guide: Unlock Cloud Success

    A progressive and proven vision for digital transformation

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Embracer sells majority stake in Saber Interactive in deal worth approximately $500 million

    What they are and when to use them

    Why you should enter a business case competition

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.