Challenges
Search…
Insecure use of FilePaths in FileProvider
The file provider_paths.xml contains the following data:
1
<?xml version="1.0" encoding="utf-8"?>
2
<paths xmlns:android="http://schemas.android.com/apk/res/android">
3
<root-path name="root" path="/"/>
4
</paths>
Copied!
You can use the Nuclei template provider-path.yaml on a decompiled Android app to identify this misconfiguration.
1
echo /output_apktool/ | nuclei -t /file/android/provider-path.yaml
Copied!
Observe the provider has the root folder configuration that allows us to access home directory (which also includes /data and /sdcard directory).
This misconfiguration can be chained with other vulnerabilities like Intent Redirection to steal sensitive data or Overwriting arbitrary files to achieve arbitrary code execution by Overwriting native libraries.
Last modified 4mo ago
Copy link