Twitter lite(Android): Vulnerable to local file steal, Javascript injection, Open redirect

Disclosed: 2019-04-29 16:17:02 By rahulkankrale To x
Critical
Vulnerability Details
**Summary:** com.twitter.android.lite.TwitterLiteActivity is set to exported and doesn't validate data pass to intent due to which this activity vulnerable to steal users local files, javascript injection and open redirect. **Description:** com.twitter.android.lite.TwitterLiteActivity is set to exported so external app can communicate with it. As this activity doesn't validate data pass through intent critical uri like javascript and file so malicious app can steal users files as well as inject javascript. It can leads to many issue like UXSS, Token steal, etc. ## Steps To Reproduce: 1. To reproduce we use ADB tool 2. To reproduce local file access use: adb shell am start -n com.twitter.android.lite/com.twitter.android.lite.TwitterLiteActivity -d "file:///sdcard/BugBounty/1.html" 3. To reproduce javascript injection: adb shell am start -n com.twitter.android.lite/com.twitter.android.lite.TwitterLiteActivity -d "javascript://example.com%0A alert(1);" 4. To reproduce open redirect: adb shell am start -n com.twitter.android.lite/com.twitter.android.lite.TwitterLiteActivity -d "http://evilzone.org" * Video of POC attached. Thanks ## Impact As critical uri like javascript & file is not being validate malicious app can steal users session token, users files etc.
Actions
View on HackerOne
Report Stats
  • Report ID: 499348
  • State: Closed
  • Substate: resolved
  • Upvotes: 88
Share this report