Lucene search

K
osvGoogleOSV:GHSA-WFGJ-WRGH-H3R3
HistoryMar 22, 2024 - 11:54 p.m.

SSRF Vulnerability on assetlinks_check(act_name, well_knowns)

2024-03-2223:54:53
Google
osv.dev
4
mobsf
trendyol application security
androidmanifest.xml
intent-filter
vulnerability
ssrf
get request
input validation
hostnames
local hostnames
security
poc
impact
internal services

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%

Summary

While examining the “App Link assetlinks.json file could not be found” vulnerability detected by MobSF, we, as the Trendyol Application Security team, noticed that a GET request was sent to the “/.well-known/assetlinks.json” endpoint for all hosts written with “android:host”. In the AndroidManifest.xml file.

Since MobSF does not perform any input validation when extracting the hostnames in “android:host”, requests can also be sent to local hostnames. This may cause SSRF vulnerability.

Details

Example <intent-filter structure in AndroidManifest.xml:

&lt;intent-filter android:autoVerify="true"&gt;
&lt;action android:name="android.intent.action.VIEW" /&gt;
&lt;category android:name="android.intent.category.DEFAULT" /&gt;
&lt;category android:name="android.intent.category.BROWSABLE" /&gt;
&lt;data android:host="192.168.1.102/user/delete/1#" android:scheme="http" /&gt;
&lt;/intent-filter&gt;

We defined it as android:host=“192.168.1.102/user/delete/1#”. Here, the “#” character at the end of the host prevents requests from being sent to the “/.well-known/assetlinks.json” endpoint and ensures that requests are sent to the endpoint before it.

<img width=“617” alt=“image” src=“https://github.com/MobSF/Mobile-Security-Framework-MobSF/assets/150332295/c570cb00-e947-4ad7-af80-26d46c0ad3f7”>

PoC

https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link

Impact

The attacker can cause the server to make a connection to internal-only services within the organization’s infrastructure.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%

Related for OSV:GHSA-WFGJ-WRGH-H3R3