Upon auditing the app, we also encountered a couple of potentially catastrophic vulnerabilities. These issues can affect thousands of Clubster users.

PII Breach, Code Insertion, IDOR

We have categorized the issues found in our research as follows:

Clubster App Exposes Members and Guests

Our security team confirmed that 14,271 members and guests at 176 country clubs were accidentally exposed by the Clubster app.

We also found that Grink Inc.’s Switch app leaked 4,765 users’ data and severe issues with gaming giant Sega’s cloud security. Misconfigured S3 bucket permissions were the problem in those cases as well.

Malicious Code Injection Vulnerability

We were able to inject malicious code into Clubster posts and modify the posts of other users. Therefore, it would have been possible for a cybercriminal to steal user accounts and embed malicious scripts in Clubster posts. Clubster made no attempt to filter JavaScript in posts. As a result, it was possible to insert custom-made malicious code in our own posts. Combined with the IDOR vulnerabilities, any user could insert malicious code into any post or group post visible to them.

As proof-of-concept (PoC), we added a malicious script to a post on a target user’s home screen. When we logged in as the target user, the script ran and displayed our session cookie. We determined we could steal the account of any Clubster user we were friends with, as long as that user had at least one (1) post on their home screen.

IDOR Vulnerability

We also found vulnerabilities in Clubster’s API, which is a software interface used in modern software development. It is also well understood that APIs are a cybercriminal favorite and that API-related attacks are on the rise. We found two API endpoints that allowed insecure direct object references (IDOR). This IDOR vulnerability allows users to change other users’ posts. It also lets users change group posts.

To exploit this serious vulnerability, a malicious user needed to capture and change HTTP requests. So to simulate the IDOR attack, we edited one of our posts and captured the HTTP request. We altered the request and changed the ID to another post. It succeeded, proving we were able to edit other’s posts.

We found two endpoints in Clubster’s API that were affected by an IDOR vulnerability. We were able to edit any user or group post controlled by these endpoints.

Clubster Breach Timeline

We have organized our breach research timeline as follows;

The Clubster App is Now Secure

Per the above, we notified Clubster, and they closed the PII breach in January 2022. In the next two months, Clubster repaired the rest of the vulnerabilities. Their users are now safe from potential attacks. Clubster is a social networking app designed for country clubs and other groups. The app has features that enable users to post news, events, and announcements, share material in groups, and create custom events. Clubster’s team rebuilt their API to close the vulnerabilities in the old version of the app.

Lessons Learned From Clubster’s Vulnerability

Breaches and vulnerabilities can prove to be especially serious in a social media app. Accounts that users would otherwise trust can be used to commit fraud and theft. And in this case, the victims themselves may be desirable as members of country clubs. VPNOverview cybersecurity expert Aaron Phillips had this to say: “I think it’s interesting that Clubster recently changed hands. Surely the original developers knew that posts weren’t sanitized and there was no access control in the /edit endpoints. It’s unfortunate the software was sold in that state, and we’re glad this breach was closed instead of exploited.”

Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 7Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 19Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 97Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 5Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 5Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 32Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 23Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 23Clubster App Leaked User Data  Additional Vulnerabilities Were Present - 45