ACCESS CONTROL ISSUES 1 - INTENT FILTER VULNERABILITY (1)
- Layout for this exercise:
- Connecting from Santoku to Nexus 5 with ADB:
- Launching the application:
- Clicking the tab for challenge 9:
- The application allows to see the API credentials:
- However, the goal of this challenge is to access the API credentials from outside the application, taking advantage of the incorrect validation system used in this activity.
- Let's have a look at the Java source code of the activity for this challenge, AccessControl1Activity:
- The jakhar.aseem.diva.action.VIEW_CREDS is the intent filter responsible for allowing the credentials to be displayed by the application:
- Opening the Java source code for APICredsActivity.java:
- Also, the AndroidManifest.xml indicates the presence of the mentioned intent filter:
- Now, using the Activity Manager tool we can start the intent filter jakhar.aseem.diva.action.VIEW_CREDS from Santoku Linux, without using the DIVA application interface at the Nexus 5 device:
-The result is the application starting by itself and showing the API credentials:
- By the way, an apart for the previous exercise, Activity Manager can also be used for other tasks. For instance, to open a web browser remotely at the mobile device: