Grindr bug meant accounts could be hijacked with just an email address
Security flaw could have left Grindr accounts open to attack
Users of dating app Grindr have been warned to ensure their accounts are secure following the disclosure of a potentially dangerous security flaw.
Researchers discovered that attackers could be able to hijack a user’s account without using a password, with only an email address required to gain access.
Grindr is one of the world largest dating apps, allowing gay, lesbian, bisexual and trans users to chat and meet.
- Check out our list of the best endpoint protection services out there
- We've built a list of the best antivirus services around
- Here's our choice of the best malware removal software on the market
Grindr security
The flaw was discovered by French security researcher Wassime Bouimadaghene, who teamed up with security expert Troy Hunt after Grindr failed to respond to his original alert.
The issue concerned how the Grindr app dealt with requests from users to change their account passwords. The app would send out an email to users containing an account password reset token, which when clicked, allowed them to change their password and re-enter their account.
However the password reset page was leaking these tokens to the browser, meaning anyone who knew a user’s account email address could request a password reset. Hackers could have used this system to form their own malicious password reset link using these leaked tokens, resetting a user’s password without them knowing, giving access to an account and the personal information included within.
Grindr says it has now fixed the issue, which it says was addressed before it could be exploited, and thanked Bouimadaghene for his work. There’s no suggestion any user accounts were affected, but users should ensure they have a strong password in place anyway.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“This is a reminder for organisations to constantly check for vulnerabilities, whether it is leaking password tokens, a back door left open, or anything in between,” noted Jake Moore, Cybersecurity Specialist at ESET.
“Internal security researchers and threat hunters may not always seem a proactive way of spending money, but the safest way to keep on top of business protection is to continually try to discover vulnerabilities before bad actors find and exploit them.”
Grindr was previously named as one of a series of popular dating apps recently found to be leaking user information, along with the likes of Tinder and OKCupid, which were found to be collectively sharing users' personal information with at least 135 companies.
- Here's the best Android antivirus on the market
Via TechCrunch
Mike Moore is Deputy Editor at TechRadar Pro. He has worked as a B2B and B2C tech journalist for nearly a decade, including at one of the UK's leading national newspapers and fellow Future title ITProPortal, and when he's not keeping track of all the latest enterprise and workplace trends, can most likely be found watching, following or taking part in some kind of sport.