How We Could Have Listened to Anyone’s Call Recordingsby@appsecure

How We Could Have Listened to Anyone’s Call Recordings

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

The “Automatic Call Recorder” application is one of the popular applications used by iPhone users to record their calls. An attacker can pass another user’s number in the recordings request and the API will respond with the recording URL of the storage bucket without any authentication. The vulnerability was responsibly disclosed by [Anand Prakash] and [PingSafe] and is now fixed. PingSafe decompiled the IPA file and figured out S3 buckets, hostnames, and other sensitive details used by the application.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How We Could Have Listened to Anyone’s Call Recordings
Anand Prakash HackerNoon profile picture

@appsecure

Anand Prakash


Receive Stories from @appsecure

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa