Lucene search

K
githubGitHub Advisory DatabaseGHSA-WFGJ-WRGH-H3R3
HistoryMar 22, 2024 - 11:54 p.m.

SSRF Vulnerability on assetlinks_check(act_name, well_knowns)

2024-03-2223:54:53
CWE-918
GitHub Advisory Database
github.com
16
mobsf
trendyol
androidmanifest.xml
get request
input validation
local hostnames
ssrf vulnerability
intent-filter
android:host
server connection

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%

Summary

While examining the “App Link assetlinks.json file could not be found” vulnerability detected by MobSF, we, as the Trendyol Application Security team, noticed that a GET request was sent to the “/.well-known/assetlinks.json” endpoint for all hosts written with “android:host”. In the AndroidManifest.xml file.

Since MobSF does not perform any input validation when extracting the hostnames in “android:host”, requests can also be sent to local hostnames. This may cause SSRF vulnerability.

Details

Example <intent-filter structure in AndroidManifest.xml:

&lt;intent-filter android:autoVerify="true"&gt;
&lt;action android:name="android.intent.action.VIEW" /&gt;
&lt;category android:name="android.intent.category.DEFAULT" /&gt;
&lt;category android:name="android.intent.category.BROWSABLE" /&gt;
&lt;data android:host="192.168.1.102/user/delete/1#" android:scheme="http" /&gt;
&lt;/intent-filter&gt;

We defined it as android:host=“192.168.1.102/user/delete/1#”. Here, the “#” character at the end of the host prevents requests from being sent to the “/.well-known/assetlinks.json” endpoint and ensures that requests are sent to the endpoint before it.

<img width=“617” alt=“image” src=“https://github.com/MobSF/Mobile-Security-Framework-MobSF/assets/150332295/c570cb00-e947-4ad7-af80-26d46c0ad3f7”>

PoC

https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link

Impact

The attacker can cause the server to make a connection to internal-only services within the organization’s infrastructure.

Affected configurations

Vulners
Node
mobsfscanRange<0.3.8
CPENameOperatorVersion
mobsfscanlt0.3.8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%

Related for GHSA-WFGJ-WRGH-H3R3