The plist files are convenient to use and can be used to store standard data types, such as integer, strings, and so on. Many times a developer makes the mistake of saving sensitive information in plist. Many top companies' iOS app had mistakenly stored users' credentials/pin in the plist files in their earlier versions.
An attacker can easily look into these plist files for sensitive information.
We will use the
ContactDetails.ipa iOS app that is provided with the code bundle of this chapter in order to demonstrate this vulnerability. Let's follow the given steps in order to identify the insecure storage vulnerability in the given iOS app:
Start the ContactDetails app and you will observe various fields, such as name, credit card number, CVV, and password, as shown in the following screenshot:
Fill up all the details and use the Save option. All of the earlier information such as credit card number and CVV is sensitive financial information and is supposed to...