I’ve been keeping watching the popular show Mr. Robot, and recently in the show they started using
Wickr as a secure messenger.
This reminded me of a bug I disclosed to
Wickr generous bug bounty in
January 2014 which I never wrote about.
Actually the problem it’s just some leakage of very sensitive informations in the Android system logs in the
18.104.22.168 Beta Android version at that time.
Wickr was internally using a
SQLCipher for encrypting your chats and stuff.
If you worked on Android apps you most likely encountered at least once
Basically it’s a regular sqlite database, but with a added layer of AES encryption. You need a key to be able to query and write the db.
So the whole security purpose is not to leak that key ever, otherwise it’s just like a dump sqlite DB…
Turns out that
Wickr was leaking this same key in the system logs, and if you recall in 2014 there were still lot of old Android phones version around where log access was not so difficult.
Also another information, most likely about authentication with their web services was leaked, however I didn’t inspect its purpose. Omitted from logs
I reported the vuln the 16th of January 2014, and the patch was quite quick, but I don’t remember the details.
A embargo of 3 months was set for the bounty.