Publix Android Apps Password Exposures

Summary

The Publix Android app transmits the user's password with broken SSL, and then stores it on the phone without encryption, exposing it to theft.

These are the #2 and #3 most important security flaws, according to OWASP.

As discussed here, passwords should not be stored on the phone at all. Because users re-use passwords, they are very sensitive information and handling them carelessly is a disservice to your customers. Locally stored passwords could be stolen by malware on the phone, or by simply stealing the phone itself. Instead, a random cookie should be stored on the phone, which is useless at any other company.

Detailed Tests

Here's the app I tested:

 

When I log in:

The data can be stolen via a MITM attack, because the SSL certificate is not verified.

Here's the password stored in plaintext on the phone:

Notification

I sent this message on 5-13-17:


Posted 5-13-17 by Sam Bowne