search menu icon-carat-right cmu-wordmark

CERT Coordination Center

TaxiHail Android mobile app contains multiple vulnerabilties

Vulnerability Note VU#439016

Original Release Date: 2015-12-08 | Last Revised: 2015-12-08


Mobile Knowledge's TaxiHail is vulnerable to information disclosure and missing encryption of sensitive data.


The Mobile Knowledge TaxiHail framework "allows passengers to book and manage their own reservations via iOS, android or the web in real-time, alleviating call congestion during peak busy hours."

TaxiHail prior to version 3.1.26 has been reported vulnerable to the following issues:

CWE-276: Incorrect Default Permissions

TaxiHail creates a log file that contains the GPS information about the user. The log file does not contain proper permissions, allowing other apps to read the log's location data.

CWE-311: Missing Encryption of Sensitive Data

TaxiHail does not use encryption when communicating with the server.

TaxiHail can be customized for deployment by taxi companies, meaning that multiple apps available via the iOS and Google app stores may inherit this vulnerability. According to the reporter, "over 100" apps may derive from TaxiHail.


An unauthenticated remote attacker may be able to gain private knowledge of the app user, and sniff network traffic from the app.


Apply an update

Mobile Knowledge has addressed this issue in version 3.1.26 of the TaxiHail app for both Android and iOS. Apps making use of TaxiHail have also been regenerated.

An older version of TaxiHail was reported as not correctly validating SSL certificates. According to the reporter, this issue is fixed in the latest version of TaxiHail. It is currently unclear which version originally addressed this problem.

Affected users should update their apps as soon as possible to obtain the fix.

Vendor Information


Mobile Knowledge Affected

Updated:  December 08, 2015



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.9 E:POC/RL:OF/RC:C
Environmental 4.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to the Shaftek Security Research Team for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: None
Date Public: 2015-12-08
Date First Published: 2015-12-08
Date Last Updated: 2015-12-08 15:38 UTC
Document Revision: 20

Sponsored by CISA.