Improper protection of FileContentProvider

Disclosed: 2020-03-01 14:05:16 By mmmds To nextcloud
Low
Vulnerability Details
Some data in the FileContentProvider is protected against applications not related to NextCloud. The application checks if calling application package name contains "com.nextcloud.client" string. Every application with such substring in package name is allowed to fully access FileContentProvider. com.owncloud.android.providers.FileContentProvider ``` java private boolean isCallerNotAllowed() { String callingPackage = this.mContext.getPackageManager().getNameForUid(Binder.getCallingUid()); return callingPackage == null || !callingPackage.contains(this.mContext.getPackageName()); } ``` ## Impact Malicious applications with "com.nextcloud.client" in their package names are able to access FileContentProvider without restrictions. For example they are able to read private keys to end-to-end encryption using URI: content://org.nextcloud/arbitrary_data
Actions
View on HackerOne
Report Stats
  • Report ID: 331302
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report