For an app all about spilling the beans on who you’re allegedly courting, it’s ironic that TeaOnHer was once spilling the private knowledge of 1000’s of its customers to the open cyber web.
TeaOnHer was once designed for males to proportion pictures and details about ladies they declare to were courting. However just like Tea, the dating-gossip app for ladies it was once looking to reflect, TeaOnHer had gaping holes in its safety that revealed its customers’ non-public knowledge, together with pictures in their driving force’s licenses and different government-issued id paperwork, as TechCrunch reported closing week.
Those gated community-like apps had been created ostensibly to let customers proportion details about their relationships below the guise of private protection. On the other hand, shoddy coding and safety flaws spotlight the continued privateness dangers inherent in requiring customers to put up delicate knowledge to make use of apps and internet sites.
Such dangers are best going to irritate; fashionable apps and cyber web products and services are already having to conform to age verification rules that require folks to put up their id paperwork prior to they are able to be granted get right of entry to to adult-themed content material, regardless of the privateness and safety dangers related to storing databases of folks’s non-public knowledge.
When TechCrunch printed our tale closing week, we didn’t put up explicit main points of the insects we came upon in TeaOnHer, erring at the facet of warning so that you can now not lend a hand unhealthy actors exploit the malicious program. As a substitute, we made up our minds to put up a restricted disclosure, on account of the app’s emerging reputation and the fast dangers that customers confronted when the usage of the app.
As of the time of disclosure, TeaOnHer was once #2 within the unfastened app charts at the Apple App Retailer, a place nonetheless held through the app nowadays.
The failings we discovered seem to be resolved. TechCrunch can now proportion how we had been in a position to seek out customers’ driving force’s licenses inside of 10 mins of being despatched a hyperlink to the app within the App Retailer, because of simple to seek out flaws within the app’s public-facing backend gadget, or API.
The app’s developer, Xavier Lampkin, didn’t reply to more than one requests for remark once we submitted main points of the safety flaws, nor would Lampkin decide to notifying affected TeaOnHer customers or state regulators of the safety lapse.
We additionally requested Lampkin if any safety evaluations had been performed prior to the TeaOnHer app was once introduced, however we were given no answer. (We have now extra on disclosure afterward.)
Alright, get started the clock.
TeaOnHer uncovered ‘admin panel’ credentials
Sooner than we even downloaded the app, we first sought after to determine the place TeaOnHer was once hosted on the net through taking a look at its public-facing infrastructure, reminiscent of its website online and anything else hosted on its area.
That is normally a just right position to start out because it is helping perceive what different products and services the area is attached to on the net.
To search out the area title, we first regarded (by accident) on the app’s list at the Apple App Retailer to seek out the app’s website online. This will normally be present in its privateness coverage, which apps should come with prior to Apple will checklist them. (The app list additionally claims the developer “does now not accumulate any information from this app,” which is demonstrably false, so take that as you’re going to.)
TeaOnHer’s privateness coverage was once within the type of a printed Google Document, which integrated an e mail cope with with a teaonher.com
area, however no website online.
The website online wasn’t public on the time, so without a website online loading, we regarded on the area’s public-facing DNS data, which is able to lend a hand to spot what else is hosted at the area, reminiscent of the kind of e mail servers or cyber web website hosting. We additionally sought after to search for any public subdomains that the developer would possibly use to host capability for the app (or host different assets that will have to most likely now not be public), reminiscent of admin dashboards, databases, or different web-facing products and services.
But if we regarded on the TeaOnHer’s public web data, it had no significant knowledge rather then a unmarried subdomain, appserver.teaonher.com
.
Once we opened this web page in our browser, what loaded was once the touchdown web page for TeaOnHer’s API (for the curious, we uploaded a duplicate right here). An API merely permits issues on the net to be in contact with every different, reminiscent of linking an app to its central database.
It was once in this touchdown web page that we discovered the uncovered e mail cope with and plaintext password (which wasn’t that a ways off “password”) for Lampkin’s account to get right of entry to the TeaOnHer “admin panel.”
The API web page confirmed that the admin panel, used for the record verification gadget and consumer control, was once situated at “localhost,” which merely refers back to the bodily pc working the server and would possibly not were immediately obtainable from the web. It’s unclear if somebody may have used the credentials to get right of entry to the admin panel, however this was once in itself a sufficiently alarming discovering.
At this level, we had been best about two mins in.
Another way, the API touchdown web page didn’t do a lot rather then be offering some indication as to what the API can do. The web page indexed a number of API endpoints, which the app must get right of entry to with a purpose to serve as, reminiscent of retrieving consumer data from TeaOnHer’s database, for customers to go away evaluations, and sending notifications.
With wisdom of those endpoints, it may be more straightforward to have interaction with the API immediately, as though we had been imitating the app itself. Each and every API is other, so studying how an API works and find out how to be in contact with one can take time to determine, reminiscent of which endpoints to make use of and the parameters had to successfully discuss its language. Apps like Postman may also be useful for gaining access to and interacting immediately with APIs, however this calls for time and a definite stage of trial and blunder (and persistence) to make APIs spit out information once they shouldn’t.
However on this case, there was once a fair more straightforward method.
TeaOnHer API allowed unauthenticated get right of entry to to consumer information
This API touchdown web page integrated an endpoint known as /doctors
, which contained the API’s auto-generated documentation (powered through a product known as Swagger UI) that contained the entire checklist of instructions that may be carried out at the API.
This documentation web page was once successfully a grasp sheet of all of the movements you’ll be able to carry out at the TeaOnHer API as a typical app consumer, and extra importantly, because the app’s administrator, reminiscent of developing new customers, verifying customers’ id paperwork, moderating feedback, and extra.
The API documentation additionally featured the power to question the TeaOnHer API and go back consumer information, necessarily letting us retrieve information from the app’s backend server and show it in our browser.
Whilst it’s now not unusual for builders to put up their API documentation, the issue right here was once that some API requests may well be made with none authentication — no passwords or credentials had been wanted to go back knowledge from the TeaOnHer database. In different phrases, that you must run instructions at the API to get right of entry to customers’ personal information that are meant to now not were obtainable to a consumer of the app, let by myself somebody on the net.
All of this was once very easily and publicly documented for somebody to peer.
Soliciting for a listing of customers these days within the TeaOnHer id verification queue, for instance — not more than urgent a button at the API web page, not anything fancy right here — would go back dozens of account data on individuals who had lately signed as much as TeaOnHer.
The data returned from TeaOnHer’s server contained customers’ distinctive identifiers throughout the app (necessarily a string of random letters and numbers), their public profile display title, and self-reported age and site, along side their personal e mail cope with. The data additionally integrated cyber web cope with hyperlinks containing pictures of the customers’ driving force’s licenses and corresponding selfies.
Worse, those pictures of driving force’s licenses, government-issued IDs, and selfies had been saved in an Amazon-hosted S3 cloud server set as publicly obtainable to somebody with their cyber web addresses. This public environment we could somebody with a hyperlink to any person’s id paperwork open the information from anyplace without a restrictions.

With that distinctive consumer identifier, lets additionally use the API web page to immediately glance up person customers’ data, which might go back their account information and any in their related id paperwork. With uninhibited get right of entry to to the API, a malicious consumer may have scraped large quantities of consumer information from the app, just like what took place with the Tea app to start with.
From bean to cup, that was once about 10 mins, and we hadn’t even logged-in to the app but. The insects had been really easy to seek out that it might be sheer success if no person malicious discovered them prior to we did.
We requested, however Lampkin would now not say if he has the technical talent, reminiscent of logs, to decide if somebody had used (or misused) the API at any time to achieve get right of entry to to customers’ verification paperwork, reminiscent of through scraping cyber web addresses from the API.
Within the days since our report back to Lampkin, the API touchdown web page has been taken down, along side its documentation web page, and it now presentations best the state of the server that the TeaOnHer API is working on as “wholesome.” A minimum of on cursory exams, the API now seems to depend on authentication, and the former calls made the usage of the API now not paintings.
The cyber web addresses containing customers’ uploaded id paperwork have additionally been limited from public view.
TeaOnHer developer disregarded efforts to divulge flaws
For the reason that TeaOnHer had no reliable website online on the time of our findings, TechCrunch contacted the e-mail cope with indexed at the privateness coverage with the intention to divulge the safety lapses.
However the e mail bounced again with an error announcing the e-mail cope with couldn’t be discovered. We additionally attempted contacting Lampkin in the course of the e mail cope with on his website online, Newville Media, however our e mail bounced again with the similar error message.
TechCrunch reached Lampkin by the use of LinkedIn message, asking him to supply an e mail cope with the place lets ship main points of the safety flaws. Lampkin answered with a basic “make stronger” e mail cope with in reaction.
When TechCrunch discloses a safety flaw, we succeed in out to verify first that an individual or corporate is the proper recipient. Another way, blindly sending main points of a safety malicious program to the mistaken consumer may just create a possibility. Sooner than sharing explicit main points of the failings, we requested the recipient of the “make stronger” e mail cope with if this was once the proper cope with to divulge a safety publicity involving TeaOnHer consumer information.
“You should have us at a loss for words with ‘the Tea app’,” Lampkin answered through e mail. (We hadn’t.) “We don’t have a safety breach or information leak,” he mentioned. (It did.) “We have now some bots at maximum however we haven’t scaled sufficiently big to be in that dialog but, sorry you had been misinformed.” (We weren’t)
Glad that we had established touch with the proper consumer (albeit now not with the reaction we won), TechCrunch shared main points of the safety flaws, in addition to a number of hyperlinks to uncovered driving force’s licenses, and a duplicate of Lampkin’s personal information to underscore the severity of the safety problems.
“Thanks for this knowledge. That is very regarding. We’re going to soar in this presently,” mentioned Lampkin.
Regardless of a number of follow-up emails, we’ve now not heard from Lampkin since we disclosed the safety flaws.
It doesn’t subject should you’re a one-person device store or a billionaire vibe coding via a weekend: Builders nonetheless have a duty to stay their customers’ information secure. If you’ll be able to’t stay your customers’ personal information secure, don’t construct it to start with.
When you’ve got proof of a well-liked app or carrier leaking or exposing knowledge, get in contact. You’ll be able to securely touch this reporter by the use of encrypted message at zackwhittaker.1337 on Sign.