• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

You are here: Home / Cyber Security News / Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

Various popular Android programs obtainable in Google Engage in Retailer are inclined to a path traversal-affiliated vulnerability that could be exploited by a malicious application to overwrite arbitrary documents in the vulnerable app’s property listing.

“The implications of this vulnerability pattern include arbitrary code execution and token theft, dependent on an application’s implementation,” Dimitrios Valsamaras of the Microsoft Danger Intelligence crew explained in a report revealed Wednesday.

Effective exploitation could permit an attacker to just take entire handle of the application’s behavior and leverage the stolen tokens to acquire unauthorized entry to the victim’s on line accounts and other facts.

Two of the applications that ended up found vulnerable to the problem are as follows –

  • Xiaomi File Manager (com.mi. Android.globalFileexplorer) – About 1 billion installs
  • WPS Business office (cn.wps.moffice_eng) – Above 500 million installs

Whilst Android implements isolation by assigning every single software its possess focused info and memory area, it features what’s named a articles service provider to aid details and file sharing between apps in a safe fashion. But implementation oversights could help bypassing of read/publish constraints in just an application’s property listing.

“This content material provider-based mostly product offers a well-described file-sharing system, enabling a serving software to share its documents with other applications in a safe method with great-grained manage,” Valsamaras mentioned.

“On the other hand, we have usually encountered scenarios in which the consuming application would not validate the material of the file that it receives and, most relating to, it uses the filename supplied by the serving application to cache the been given file inside the consuming application’s internal knowledge directory.”

This pitfall can have really serious repercussions when a serving app declares a destructive variation of the FileProvider course in get to permit file sharing amongst apps, and eventually trigger the consuming software to overwrite critical information in its non-public info house.

Place otherwise, the system will take gain of the actuality that the consuming app blindly trusts the input to ship arbitrary payloads with a certain filename by indicates of a custom made, explicit intent and without the need of the user’s know-how or consent, foremost to code execution.

As a outcome, this could allow an attacker to overwrite the concentrate on app’s shared choices file and make it talk with a server under their handle to exfiltrate sensitive info.

One more circumstance consists of apps that load native libraries from its personal knowledge listing (in its place of “/data/application-lib”), in which scenario a rogue app could exploit the aforementioned weak spot to overwrite a indigenous library with destructive code that receives executed when the library is loaded.

Pursuing responsible disclosure, both of those Xiaomi and WPS Place of work have rectified the issue as of February 2024. Microsoft, nonetheless, explained the issue could be much more widespread, demanding that builders choose steps to test their apps for very similar issues.

Google has also posted its have guidance on the matter, urging builders to appropriately tackle the filename furnished by the server software.

“When the shopper application writes the acquired file to storage, it need to ignore the filename supplied by the server software and as an alternative use its personal internally generated special identifier as the filename,” Google claimed. “If creating a special filename is not practical, the shopper application should sanitize the supplied filename.”

Identified this write-up exciting? Stick to us on Twitter  and LinkedIn to browse much more special material we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million
Next Post: Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

Copyright © 2025 · AllTech.News, All Rights Reserved.