Malicious apps can crash Nextcloud Android client by sending malformed intents

Disclosed: 2021-06-17 10:50:12 By bigbug To nextcloud
Unknown
Vulnerability Details
Not sure if this can be tracked as a security issue, but this definitely calls for a code change. This can be classified into Denial of Service category attack and can seriously hamper user experience. Asset: Nexcloud Android Client (com.nextcloud.client) Version: 3.11.1 (latest) ###_Details_ The Nextcloud android app registers a deeplink `nc://login` that is handled by the `com.owncloud.android.authentication.ModifiedAuthenticatorActivity` class as seen in AndroidManifest file. The above mentioned class implements `AuthenticatorActivity` class in order to handle incoming deeplinks. It is seen that the method `parseLoginDataUrl` does not handle exception correctly crashing the Nextcloud app. malicious apps can thus crash the nextcloud client by sending following data in intent : `nc://login`. ADB payload: ``` adb shell am start -a "android.intent.action.VIEW" -c "android.intent.category.DEFAULT" -n "com.nextcloud.client/com.owncloud.android.authentication.ModifiedAuthenticatorActivity" -d "nc://login" ``` Attaching video PoC {F803256} ## Impact 1. Malicious apps can crash the nextcloud android client to cause a denial of service attack.
Actions
View on HackerOne
Report Stats
  • Report ID: 859136
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report