Loading HuntDB...

iOS app crashed by specially crafted direct message reactions

Medium
X
X (Formerly Twitter)
Submitted None
Reported by alexiaya

Vulnerability Details

Technical details and impact analysis

Uncontrolled Resource Consumption
**Summary:** iOS app crashed by specially crafted direct message reactions **Description:** Twitter does not properly sanitize direct message reactions, making it possible for arbitrary reaction text to be shown to the user via the message preview in the direct message list. Special characters such as `\r` and `\n` are not stripped, and it is even possible to crash the app by inserting a `\0` character into the reaction text. ## Steps To Reproduce: (Add details for how we can reproduce the issue) 1. Start a direct message conversation with the victim (this can also be yourself). 1. Make a request to https://api.twitter.com/1.1/dm/reaction/new.json with an appropriate `conversation_id` and `dm_id` parameter, and `reaction_key` set to `\0` (an actual NUL byte). 1. Notice that the iOS app crashes, even on any subsequent attempts to reopen it. ## Impact This makes it trivial for an attacker to make the Twitter iOS app unusable for any user they can send a direct message to. The only recourse for the victim is to log in via twitter.com and delete the affected message or conversation.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$560.00

Submitted

Weakness

Uncontrolled Resource Consumption