Lucene search

K
huntrBlackbeard66619E68377-E071-4A8E-AA4C-CD84A426602E
HistoryAug 13, 2023 - 6:10 a.m.

Improper validation of intent data received in TextViewerActivity allows opening of arbitrary files

2023-08-1306:10:00
blackbeard666
www.huntr.dev
9
improper validation
textvieweractivity
arbitrary files
malicious application
proof of concept
security vulnerability

0.001 Low

EPSS

Percentile

20.7%

Description

Tested on Build87 of the Inure application. It was discovered that the application had an exported activity (.activities.association.TextViewerActivity) which accepted intent data via the file scheme + text/* mime type and opened the associated files from provided URI data string.

It is possible for a malicious application installed within the device to send an intent to this activity and supply a path to a file within the Inure application’s private directory (/data/data/app.simple.inure) which the Inure application will then open.

Proof of Concept

PS C:\Users\Acer\Desktop\pwn-toolkit\apks\app.simple.inure> adb shell am start -n app.simple.inure/.activities.association.TextViewerActivity -d "file:///data/data/app.simple.inure/shared_prefs/Preferences.xml"  

Starting: Intent { dat=file:///data/data/app.simple.inure/shared_prefs/Preferences.xml cmp=app.simple.inure/.activities.association.TextViewerActivity }

This opens the Preferences.xml file which belongs to the Inure application’s private directory. The impact of this vulnerability is constrained for now, since trying to Export this opened file crashes the whole application for some reason.

0.001 Low

EPSS

Percentile

20.7%

Related for 19E68377-E071-4A8E-AA4C-CD84A426602E