Trend Micro claims that "an attacker may craft a fake file, then replace those files via the aforementioned vulnerability to perform code execution." This allows third-party apps to edit the data ShareIt uses to run, including the app cache generated during install and runtime. In effect, this vulnerability allows attackers to call on ShareIt's file-content provider and pass it a file path to get access to all of its data files. However, the developers behind ShareIt haven't given much thought to limit the app's content-provider capabilities, which can give attackers access to all files in ShareIt's "private" directory. It's up to developers to sanitize these cross-app capabilities and only expose the necessary file manager capabilities to Gmail and other apps." If Gmail wants to attach a file to an email, it can do that by showing a list of available file-content providers installed on your phone (it's basically an "open with" dialog box), and the user can pick their favorite file manager, navigate through their storage, and pass the file they want to Gmail. The publication notes: "Android prides itself on intra-app communication, partly because any app can create a content provider and provide its content and services to other apps. It also lets attackers execute malicious code remotely.Įlaborating on one of the vulnerabilities, Ars Technica reveals that ShareIt has one common Android app vulnerability that can give attackers read/write access to all of its files. Due to this extensive list of permissions, compromising the app can help attackers gain almost complete access to your phone and all your sensitive information. Furthermore, ShareIt also has complete network access. It can even delete other apps, run at startup, create accounts, and set passwords. The app can access the entire storage and all media, use the camera and microphone, access location info, and much more. We have reached out to Trend Micro for further comment, and we will update the story if we hear back.In a report on the matter, Trend Micro has revealed ( via Ars Technica) that ShareIt has access to a myriad of permissions on Android due to the functionality it offers. "We worked quickly to investigate this report, and on February 19, 2021, we released a patch to address the alleged vulnerabilities." "On February 15, 2021, we became aware of a report by Trend Micro about potential security vulnerabilities in our app," the company said in a statement to The Hacker News via email. ![]() The developer of SHAREit told The Hacker News in an email over the weekend that it has released a patch to address the "alleged" flaws following the disclosure by Trend Micro researchers. Then on June 29, 2020, the Indian government banned SHAREit along with 58 other Chinese apps over concerns that these apps were engaging in activities that threatened "national security and defence of India, which ultimately impinges upon the sovereignty and integrity of India." UPDATE In February 2019, two vulnerabilities were detected in the app that could allow attackers to bypass authentication, download arbitrary files, and pilfer files from Android devices.Ī pop-up from the fake Twitter app created to test the vulnerability ![]() SHAREit has courted a fair of security shortcomings in the past. Lastly, the app is also susceptible to what's called a man-in-the-disk (MitD) attack, which arises when careless use of "external storage" permissions opens the door to the installation of fraudulent apps and even causes a denial of service condition.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |