search menu icon-carat-right cmu-wordmark

CERT Coordination Center


TaxiHail Android mobile app contains multiple vulnerabilties

Vulnerability Note VU#439016

Original Release Date: 2015-12-08 | Last Revised: 2015-12-08

Overview

Mobile Knowledge's TaxiHail is vulnerable to information disclosure and missing encryption of sensitive data.

Description

The Mobile Knowledge TaxiHail framework "allows passengers to book and manage their own reservations via iOS, android or the web in real-time, alleviating call congestion during peak busy hours."

TaxiHail prior to version 3.1.26 has been reported vulnerable to the following issues:

CWE-276: Incorrect Default Permissions

TaxiHail creates a log file that contains the GPS information about the user. The log file does not contain proper permissions, allowing other apps to read the log's location data.

CWE-311: Missing Encryption of Sensitive Data

TaxiHail does not use encryption when communicating with the server.

TaxiHail can be customized for deployment by taxi companies, meaning that multiple apps available via the iOS and Google app stores may inherit this vulnerability. According to the reporter, "over 100" apps may derive from TaxiHail.

Impact

An unauthenticated remote attacker may be able to gain private knowledge of the app user, and sniff network traffic from the app.

Solution

Apply an update

Mobile Knowledge has addressed this issue in version 3.1.26 of the TaxiHail app for both Android and iOS. Apps making use of TaxiHail have also been regenerated.

An older version of TaxiHail was reported as not correctly validating SSL certificates. According to the reporter, this issue is fixed in the latest version of TaxiHail. It is currently unclear which version originally addressed this problem.

Affected users should update their apps as soon as possible to obtain the fix.

Vendor Information

439016
Expand all

Mobile Knowledge

Updated:  December 08, 2015

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.9 E:POC/RL:OF/RC:C
Environmental 4.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to the Shaftek Security Research Team for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: None
Date Public: 2015-12-08
Date First Published: 2015-12-08
Date Last Updated: 2015-12-08 15:38 UTC
Document Revision: 19

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.