Microsoft stated on Wednesday that it not too long ago recognized a vulnerability in TikTok’s Android app that might enable attackers to hijack accounts when customers did nothing greater than click on on a single errant hyperlink. The software program maker stated it notified TikTok of the vulnerability in February and that the China-based social media firm has since fastened the flaw, which is tracked as CVE-2022-28799.
The vulnerability resided in how the app verified what’s often called deeplinks, that are Android-specific hyperlinks for accessing particular person parts inside a cellular app. Deeplinks have to be declared in an app’s manifest to be used exterior of the app so, for instance, somebody who clicks on a TikTok hyperlink in a browser has the content material routinely opened within the TikTok app.
An app also can cryptographically declare the validity of a URL area. TikTok on Android, as an illustration, declares the area m.tiktok.com. Usually, the TikTok app will enable content material from tiktok.com to be loaded into its WebView element however forbid WebView from loading content material from different domains.
The researchers went on to create a proof-of-concept exploit that did simply that. It concerned sending a focused TikTok person a malicious hyperlink that, when clicked, obtained the authentication tokens that TikTok servers require for customers to show possession of their account. The PoC hyperlink additionally modified the focused person’s profile bio to show the textual content “!! SECURITY BREACH !!”
Microsoft stated it has no proof the vulnerability was actively exploited within the wild.