$560 Bounty: How Twitter’s Android App Leaked User Location
Twitter Android应用存在重大隐私漏洞:未授权情况下向所有已安装应用广播用户实时地理位置信息。该问题由安全研究员mishre发现。 2025-6-10 06:48:13 Author: infosecwriteups.com(查看原文) 阅读量:19 收藏

A Silent Broadcast That Let Any App Spy on You Without Asking

Monika sharma

Introduction

Imagine installing a seemingly harmless app on your Android phone — no permissions requested, no red flags raised. Yet, the moment you open Twitter and allow it to access your location, that harmless app starts tracking you in real time.

In a shocking vulnerability reported in Twitter’s Android application, security researcher mishre uncovered a critical privacy flaw: Twitter was unknowingly broadcasting users’ location data to every installed app on the device — no permissions required.

Let’s break this down, from impact to exploitation, and see how something as small as an unsecured broadcast can lead to complete location compromise.

The Vulnerability in Plain Terms

At its core, the issue lies in how Twitter’s Android app was handling location updates. When a user enabled the location feature in a tweet, Twitter would:

  • Access the device’s GPS data.
  • Create a broadcast intent containing this location.
  • Send this intent without restricting which apps could receive it.

文章来源: https://infosecwriteups.com/560-bounty-how-twitters-android-app-leaked-user-location-698a8f4d4b18?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh