Messaging app Freedom Chat has fixed a pair of security flaws: one that allowed a security researcher to guess registered users’ phone numbers, and another that exposed user-set PINs to others on the app.
Freedom Chat, released in June, bills itself as a secure messaging app, and claims on its website that users’ phone numbers stay private.
But security researcher Eric Daigle told TechCrunch that users’ phone numbers and PIN codes, used for locking the app, could be easily obtained by exploiting vulnerabilities.
Daigle found the vulnerabilities last week and shared their details with TechCrunch, as Freedom Chat does not provide a public way to report security flaws, like a vulnerability disclosure program. TechCrunch then alerted Freedom Chat founder Tanner Haas to the security flaws by email.
Haas confirmed to TechCrunch that the app has now reset user PINs and released a new version. Haas added that the company is removing instances where users’ phone numbers were occasionally visible, and has notched up rate-limiting on its servers to prevent mass-guess attempts.
Daigle, who published his findings in a blog post, told TechCrunch it was possible to enumerate the phone numbers of close to 2,000 users who had signed up to use Freedom Chat since it launched. Daigle said Freedom Chat’s servers allowed anyone to flood it with millions of phone number guesses to determine if a user’s phone number was stored on the servers.
Per Daigle, this technique is identical to one described by the University of Vienna in research last month, where academics scraped data on some 3.5 billion user accounts who signed up to WhatsApp by matching billions of phone numbers against WhatsApp’s servers.
Daigle also found Freedom Chat was leaking users’ PIN codes. Using an open-source network traffic inspection tool to analyze the data going in and out of the app, Daigle saw that the app would respond with the PIN codes of every other user in the same public channel — even if the PINs weren’t visible to users within the app itself.
According to Daigle, anyone who was in the default Freedom Chat channel, which users are automatically subscribed to when they first sign up, had their PIN broadcast to everyone else in the channel. Daigle told TechCrunch that knowledge of a person’s PIN could allow someone to open the app from a user’s stolen device.
In an app store update published Sunday, Freedom Chat noted: “A critical reset: A recent backend update inadvertently exposed user PINs in a system response. No messages were ever at risk, and because Freedom Chat does not support linked devices, your conversations were never accessible; however, we’ve reset all user PINs to ensure your account stays secure. Your privacy remains our top priority.”
Freedom Chat is Haas’ second messaging app, after Converso, which was delisted from app stores following the disclosure of security flaws that exposed users’ private messages and content.
