Grindr’s Reset Token Vulnerability: A Complex Vibrant Dive


Grindr’s Reset Token Vulnerability: A Complex Vibrant Dive

Grindr’s Reset Token Vulnerability: A Complex Vibrant Dive

Compensation sci and cyber protection

Dating apps maintain a treasure trove of real information regarding their owners which will make all of them an enticing goal for malicious famous actors.

On Oct 3, 2020, analysts ( Wassime Bouimadaghene exactly who located the weakness, and Troy find whom reported they) revealed which they got found a security weakness inside the matchmaking application Grindr.

This vulnerability authorized you to receive the code reset hyperlink for a free account as long as they realized the users mail. The code reset web page would range from the code reset token within its response to your client, this reset token need simply be sent to the owner.

The diagram below depicts how this deal hypothetically should happen.

If the email is sent as A BLOG POST on the server so that they can readjust the password the host is responsible for a number of duties. The servers will determine if customer provides a merchant account thereafter stimulates a one-time usage protected connect with a reset token to be emailed for the customer.

Inside security vulnerability, the host’s reply included in the body the reset token needed to use the password readjust webpage. By using the formula the reset token and the actual structure that Grindr makes use of to bring about the company’s reset website links, any customer could execute a merchant account take control of.

The complexness of that hit was low, and anyone who can access the growth tools to aid their preferred browser to take benefit from this.

Recreating the issue

speed dating events charleston sc

Although leaking a reset token within the user was a reasonably easy problem that isn’t hard to discover, I wanted to ascertain if I was able to replicate a working model of the situation and an option for it. We started by setting up an express machine and made a decision to make use of nedb for a lightweight database.

The next thing in recreating this was to create basic sign-up, and password reset content. The sign-up webpage inserts the consumer during the collection during the sticking with style.

The type isn’t really as critical as a few of the data i am storage to utilize later on for creating the reset token. The password hash, creation moments, and _id are typically always improve reset token and will eventually help it become single-use.


The password reset page is when the safety susceptability in Grindr came about thus, making this just where I will reproduce the equivalent problem. To start we checked out which email address submitted client-side exists inside databases, in the event the individual isn’t going to exist I then send the message, ‘consumer not discovered’.

In the event the customer does indeed exists then I develop something based upon his or her code hash together with the opportunity you’s password got last generated. The secret to success can be used to encrypt and decrypt the token, it should be special per individual also one-of-a-kind on every occasion similar customer resets the company’s code. Utilizing the hash plus the development energy accomplishes this target.

The very last part essential for the JWT is the cargo, utilizing the user’s identification, along with their current email address this information may decrypted later through the token and regularly check an individual’s identity. The keepsake is manufactured simply by using the cargo and so the solution after which can eventually become decrypted server-side by generating the secrets again.

As soon as created the JWT is this the next, if you should be unfamiliar with JWT I would advise examining this blog post up.

The Keepsake Leakage

dating while pregnant with another man's baby

Typically after the email address try submitted to the host most of the running would take place and then the machine would react along with some details and tell the client perhaps the reset was successful or don’t. If winning the user get a link to readjust their own code via email. This backlink is made up of a reset token appended into the reset URL.

However much like the Grindr readjust token leak, We responded to your client immediately in reaction entire body aided by the reset token alongside mailing an individual the url to reset. Setting up the building equipment you can easily view where in fact the token will be leaked.

If a malicious star got the reset token and knew of a person’s email address you will discover that the way they could combine each parts of data and gain access to the reset web page. This allows any consumer to reset another customers profile password without the need for accessibility his or her e-mail levels.

Reset Page Safety

The thing that makes the reset web page protect are mainly the JWT. There isn’t an alternative to make sure that the individual besides by validating the reset token. Which is why the essential to secure the reset token because it ends up being the recognition for a person.

The hyperlink design I used your reset connect is which happens to be conveniently reconstructed by a malicious actor on your comprehension of a contact street address and reset token.

To confirm the person I find the e-mail inside collection and begin to verify this making use of the token help and advice. Then, reproduce the secret using the same technique earlier and decode the token on your secret to have the payload.

As soon as i’ve the payload i will make use of the id stored in they evaluate against the owner’s id kept in the collection. If this pair of ids correspond to this means that that the user is definitely appropriate and that also the token has not been interfered with.

The moment the owners’ identity is actually validated an easy reset password kind is sent towards customers containing extra recognition using the reset token.


The most effective way to completely clean this problem will be get rid of the reset token from your reply through the reset page feedback looks, while still making sure the client-side internet browser receives the proof necessary for the reset consult.

This appears straightforward with these a smallish case nevertheless the more difficult the machine ends up being the difficult it’s to trap these blunders.

Grindr the good thing is repaired the mistakes in a timely fashion plus don’t assume that any person exploited this weakness. Fortunately they are opening a fresh bug bounty course to assist lessen these kinds of failure from current in the open for too long amounts of time.

About the author

Aaron administrator

Leave a Reply