Loading HuntDB...

Incorrect details on OAuth permissions screen allows DMs to be read without permission

Medium
X
X (Formerly Twitter)
Submitted None

Team Summary

Official summary from X (Formerly Twitter)

The reporter discovered that when a select set of applications are authenticated using a PIN or non-intended OAuth flow, the permission dialog that is shown may not show the permissions that the application has. We do not believe anyone was mislead by the permissions that these applications had or that their data was unintentionally accessed by the Twitter for iPhone or Twitter for Google TV applications as those applications use other authentication flows. To our knowledge, there was not a breach of anyone's information due to this issue. There are no actions people need to take at this time.

Reported by edent

Vulnerability Details

Technical details and impact analysis

Privacy Violation
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report! **Summary:** The OAuth screen can be tricked into saying that an app cannot read Direct Messages. Despite that, DMs can be read. **Description:** The official Twitter API keys have been leaked and are in use in several popular apps. The iPhone keys and Google TV keys (as seen on https://gist.github.com/shobotch/5160017) present an OAuth screen which says the app "Will not be able to: Access your direct messages." This is false. The apps *can* read DMs. ## Steps To Reproduce: (Add details for how we can reproduce the issue) 1. Ask the user to do the OAuth dance with a token generated from the official keys. 1. User sees that the app cannot read DMs. 1. User authorises. 1. App now has unauthorised access to DMs. 1. User is sad that their privacy has been violated. ## Impact: [add why this issue matters] A user may not want a 3rd party app to have access to their DMs. They rely on the OAuth screen to adequately inform them of the permissions they are granting. Is this a GDPR violation? I'm not sure. You are telling users that the 3rd party app can't read their private information - but that is false. These API keys do allow access from *any* app which integrates them. ## Supporting Material/References: * Screenshot of the OAuth screen for Google TV * Screenshot of the OAuth screen for iPhone ## Impact Unauthorised access to Direct Messages.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$2940.00

Submitted

Weakness

Privacy Violation