Hacking Tinder accounts using Facebook’s Account Kit

This post is about an account takeover vulnerability we discovered in Tinder’s application. By exploiting this, an attacker could have gained access to the victim’s Tinder account, who must have used their phone number to log in.

Security Research

This is being published with the permission of Facebook under the responsible disclosure policy.

The vulnerabilities mentioned in this blog post were plugged quickly by the engineering teams of Facebook and Tinder.

This post is about an account takeover vulnerability we discovered in Tinder’s application. By exploiting this, an attacker could have gained access to the victim’s Tinder account, who must have used their phone number to log in.

This could have been exploited through a vulnerability in Facebook’s Account Kit, which Facebook has recently addressed.

Both Tinder’s web and mobile applications allow users to use their mobile phone numbers to log into the service. And this login service is provided by Account Kit (Facebook).

alt text for medium image

Login Service Powered by Facebook’s Accountkit on Tinder

The user clicks on Login with Phone Number on tinder.com and then they are redirected to Accountkit.com for login. If the authentication is successful then Account Kit passes the access token to Tinder for login.

Interestingly, the Tinder API was not checking the client ID on the token provided by Account Kit.

This enabled the attacker to use any other app’s access token provided by Account Kit to take over the real Tinder accounts of other users.

Vulnerability Description

Account Kit is a product of Facebook that lets people quickly register for and log in to some registered apps by using just their phone numbers or email addresses without needing a password. It is reliable, easy to use, and gives the user a choice about how they want to sign up for apps.

Tinder is a location-based mobile app for searching and meeting new people. It allows users to like or dislike other users, and then proceed to a chat if both parties swiped right.

There was a vulnerability in Account Kit through which an attacker could have gained access to any user’s Account Kit account just by using their phone number. Once in, the attacker could have gotten ahold of the user’s Account Kit access token present in their cookies (aks).

After that, the attacker could use the access token (aks) to log into the user’s Tinder account using a vulnerable API.

How my exploit worked step-by-step

Step #1

First the attacker would log into victim’s Account Kit account by entering the victim’s phone number in “new_phone_number” in the API request shown below.

Please note that Account Kit was not verifying the mapping of the phone numbers with their one-time password. The attacker could enter anyone’s phone number and then simply log into the victim’s Account Kit account.

Then the attacker could copy the victim’s “aks” access token of Account Kit app from cookies.

The vulnerable Account Kit API:

_POST /update/async/phone/confirm/?dpr=2 HTTP/1.1_

_Host: [www.accountkit.com](http://www.accountkit.com)_

_new_phone_number=[vctim’s phone number]
&update_request_code=c1fb2e919bb33a076a7c6fe4a9fbfa97[attacker’s request code]
&confirmation_code=258822[attacker’s code]

alt text for medium image
Step #2

Now the attacker simply replays the following request using the copied access token “aks” of victim into the Tinder API below.

They will be logged into the victim’s Tinder account. The attacker would then basically have full control over the victim’s account. They could read private chats, full personal information, and swipe other user’s profiles left or right, among other things.

Vulnerable Tinder API:

_POST /v2/auth/login/accountkit?locale=en HTTP/1.1
Host: **api.gotinder.com**
Connection: close
Content-Length: 185
Origin: [https://tinder.com](https://tinder.com)
app-version: 1000000
platform: web
User-Agent: Mozilla/5.0 (Macintosh)
content-type: application/json
Accept: _/_
Referer: [https://tinder.com/](https://tinder.com/)
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9


Both the vulnerabilities were fixed by Tinder and Facebook quickly. Facebook rewarded us with $5,000, and Tinder awarded us with $1,250.

January 12, 2022
Anand Prakash

Anand Prakash is a prolific security researcher who is famous for finding bugs in some of the world’s most popular apps and websites. He thrives off of “bug bounties” — large cash prizes he earns from companies in exchange for successfully hacking their systems and showing them their security flaws. Anand is supremely good at what he does, having discovered vulnerabilities at companies like Facebook, Twitter, and Uber. For the past 5 years, Facebook’s has ranked Anand as one of their top bounty hunters. And on Twitter’s bounty program, he’s ranked #3 world-wide. Anand’s reputation as a hacker has lead to him being featured in last year’s Forbes “30 under 30” for enterprise technology in Asia.

In the news


Stay up to date with our research

Subscribe to our newsletter and receive notifications for new articles

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.