According to this link, https://www.forbes.com/sites/
- The vulnerability could be exploited to track a user’s location and take rides from their account via an application programming interface (API) request
- This involved first acquiring the user universally unique identifier (UUID) of any user by sending an API request that included either their telephone number or email address. “Once you have the leaked Uber UUID from the API request,” Prakash said, “you can replay the request using the victim’s Uber UUID and get access to private information like access token (mobile apps), location and address.”
- The same vulnerability impacted Uber driver accounts and Uber Eats accounts as well
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.