CVE-2024-56947
📋 TL;DR
This vulnerability in BeautyCam iOS app allows attackers to access sensitive user information by tricking users into clicking a crafted malicious link. It affects users of the BeautyCam iOS application version 12.3.60. The vulnerability represents a URL redirection issue that can lead to information disclosure.
💻 Affected Systems
- Xiamen Meitu Technology Co., Ltd. BeautyCam iOS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal sensitive user data including personal information, authentication tokens, or device identifiers through successful exploitation.
Likely Case
Attackers using phishing techniques could redirect users to malicious sites that harvest user data or session information.
If Mitigated
With proper URL validation and user awareness training, the risk is reduced to minimal information leakage.
🎯 Exploit Status
Exploitation requires user interaction (clicking a link). The GitHub reference contains technical details about the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check for app updates in the Apple App Store
2. Update to the latest version if available
3. If no update is available, consider temporarily uninstalling the app
🔧 Temporary Workarounds
Disable app or restrict permissions
allTemporarily disable or uninstall the BeautyCam app until a fix is available
User awareness training
allEducate users not to click on suspicious links, especially those received via messaging or email
🧯 If You Can't Patch
- Implement network filtering to block malicious domains that might be used in crafted links
- Use mobile device management (MDM) to restrict app installation or enforce security policies
🔍 How to Verify
Check if Vulnerable:
Check the app version in iOS Settings > General > iPhone Storage > BeautyCam
Check Version:
Not applicable - check via iOS Settings as described above
Verify Fix Applied:
Verify the app has been updated to a version newer than 12.3.60
📡 Detection & Monitoring
Log Indicators:
- Unusual URL redirects within the app
- Suspicious link clicks from the app
Network Indicators:
- Unexpected outbound connections from the app to unknown domains
- HTTP redirect patterns matching exploit techniques
SIEM Query:
Not applicable for mobile app vulnerabilities