SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
TOP Security!
6 Dec 2017

ParseDroid vulnerabilities could affect all Android developers

Checkpoint researchers discovered several vulnerabilities in Android application developer tools that put any organization that does Java/Android development at risk of an outsider gaining access to their system.

The vulnerability affects cross-platform users that use Android Studio, IntelliJ, Eclipse and APKTool and the most common Android Integrated Development Environment (IDES), according to the ParseDroid – Targeting The Android Development & Research Community report.

Researchers said the attacks could be used to target any Android developer in any organization and that there are a lot of open source tools that are using APKTool (Android Application Package Tool). Researchers examined the APKTool and found it contained a XML External Entity (XXE) vulnerability in its source code cause by the configured XML parser of APKTool not disabling external entity references when parsing an XML file within the program. The vulnerable function is called “loadDocument” and is being used in both core functionalities - ‘Build' and ‘Decompile' - of APKTool, the report said. As a result, the entire OS file system of the APKTool user is exposed and could allow attackers to retrieve any file on the victim's PC by using a malicious “AndroidManifest.xml” file that exploits an XXE vulnerability.

 “The Proof of Concept demonstrates Xml External Entity (XXE) and Path Traversal which are very common in the wild, it is possible to find numerous vulnerabilities related to that kind of attacks,” Researchers Eran Vaknin, Gal Elbaz, Alon Boxiner, and Oded Vanunu said in the report.  “Regarding to IDEs:  An attacker has to upload a malicious crafted library to a public repository (which we have done), or to target a developer and send him the malicious library specifically.”

An attacker has to generate malicious APK, upload it to the store or send it specifically to the target, researchers added. In another attack, researchers demonstrated how attackers could use public repositories to target developers by uploading malicious AAR (Android Archive Library) to them and waiting for victims to unknowingly download them.

When the victim imports the AAR from a known repository into the Android Studio project it would lead to malicious payload execution and allow file content to be sent to an attacker's server. In a separate scenario the APKtool can be exploited to attack services and users by injecting a backdoor into the APK file using the “path traversal” vulnerability. The vulnerabilities have been reported to Google, Jetbrains, Eclipse and APKTool owner and as of the time this article was written, Google, Jetbrains and APKTool owner have fixed and released a patched version.


Download SafeUM — communicate privately, without advertising and spam.

Tags:
Android information leaks
Source:
SCMagazine
1455
Other NEWS
3 Jul 2020 safeum news imgage An encrypted messaging service has been infiltrated by police
4 May 2020 safeum news imgage Two-Factor Authentication ​What Is It and Why You Should Use It
12 Dec 2019 safeum news imgage Encryption is under threat - this is how it affects you
4 Nov 2019 safeum news imgage Should Big Decisions Be Based on Data or Your Intuition?
7 Jun 2018 safeum news imgage VPNFilter malware infecting 500,000 devices is worse than we thought
4 Jun 2018 safeum news imgage Hackers target Booking.com in criminal bid to steal hundreds of thousands from customers
1 Jun 2018 safeum news imgage Operator of World's Top Internet Hub Sues German Spy Agency
30 May 2018 safeum news imgage US says North Korea behind malware attacks
29 May 2018 safeum news imgage Facebook and Google targeted as first GDPR complaints filed
25 May 2018 safeum news imgage A new reason to not buy these cheap Android devices
24 May 2018 safeum news imgage Flaws in smart pet devices, apps could come back to bite owners
23 May 2018 safeum news imgage Google sued for 'clandestine tracking' of 4.4m UK iPhone users' browsing data
21 May 2018 safeum news imgage LocationSmart reportedly leaked phone location data onto the web
18 May 2018 safeum news imgage The SEC created its own scammy ICO to teach investors a lesson
17 May 2018 safeum news imgage Thieves suck millions out of Mexican banks in transfer heist
All news
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015