REG: Content provider information leakage

Disclosed: 2016-06-24 08:48:39 By zeroknife To nextcloud
Unknown
Vulnerability Details
Issue : While analyzing your code of manifest.xml i found a issue related to content provider information leakage . Issue description : Your content provider settings will allowing any other app on the device to access it (AndroidManifest.xml). You should modify the attribute to [exported="false"] or set at least "signature" protectionalLevel permission if you don't want to. where i found the issue : provider => com.owncloud.android.providers.FileContentProvider provider => com.owncloud.android.ui.adapter.DiskLruImageCacheFileProvider Whats the impact : other apps can read the contents,the malformed application can be used to extract information from the content provider . Code from your manifest.xml kinldy note that **exported=true** : <service android:name=".authentication.AccountAuthenticatorService" android:exported="true" > <intent-filter android:priority="100" > <action android:name="android.accounts.AccountAuthenticator" /> </intent-filter> <meta-data android:name="android.accounts.AccountAuthenticator" android:resource="@xml/authenticator" /> </service> <service android:name=".syncadapter.FileSyncService" android:exported="true" > <intent-filter> <action android:name="android.content.SyncAdapter" /> </intent-filter> <meta-data android:name="android.content.SyncAdapter" android:resource="@xml/syncadapter_files" /> </service> <provider android:name=".providers.FileContentProvider" android:authorities="@string/authority" android:enabled="true" android:exported="false" android:label="@string/sync_string_files" android:syncable="true" /> <provider android:name=".providers.UsersAndGroupsSearchProvider" android:authorities="com.nextcloud.android.providers.UsersAndGroupsSearchProvider" android:enabled="true" android:exported="false" android:label="@string/search_users_and_groups_hint" /> <activity android:name=".authentication.AuthenticatorActivity" android:exported="true" android:launchMode="singleTask" android:theme="@style/Theme.ownCloud.noActionBar" > <intent-filter> <action android:name="android.intent.action.VIEW" /> <category android:name="android.intent.category.DEFAULT" /> <category android:name="android.intent.category.BROWSABLE" /> <data android:scheme="@string/oauth2_redirect_scheme" /> </intent-filter> <intent-filter> <action android:name="com.owncloud.android.workaround.accounts.CREATE" /> <category android:name="android.intent.category.DEFAULT" /> </intent-filter> </activity> references : (1)https://www.nowsecure.com/mobile-security/ebay-android-content-provider-injection-vulnerability.html (2)http://blog.trustlook.com/2013/10/23/ebay-android-content-provider-information-disclosure-vulnerability/ (3)http://www.wooyun.org/bugs/wooyun-2010-039169 Let me know incase of any other concerns
Actions
View on HackerOne
Report Stats
  • Report ID: 146179
  • State: Closed
  • Substate: informative
  • Upvotes: 4
Share this report