lcimeni / Kraken-Pro

0 stars 0 forks source link

NowSecure static analysis: Application Code Can Potentially Be Replaced Using Janus Vulnerability #80

Open lcimeni opened 3 years ago

lcimeni commented 3 years ago

Finding Description

The application is vulnerable to the Janus exploit. This would allow malicious actors to possibly inject their own code into the binary package and release it as a legitimate version of the app. Additionally, this is indicative of the app allowing or using some very outdated security protections. Allowing an app to run on an Android operating system that low, and using a signing scheme that outdated are inherently dangerous as they are not updated to patch security vulnerabilities anymore.

Steps to Reproduce

There are two components that this test looks for: the minimum Android API level that is targeted by the application, and the signing scheme used to sign the app binary.

Business Impact

The application can potentially be replaced with a malicious app without users being aware. The app could then steal user data or perform any number of other attacks while masquerading as a legitimate app.

Remediation Resources

Recommended Fix

The application should target a minimum Android SDK level of 25 or higher, and use a signing scheme more recent than v1.

Code Samples

Sample AndroidManifest Targeting a minimum of 25 (.xml)

<uses-sdk android:minSdkVersion="25" android:targetSdkVersion="30" />

Sample Gradle configuration to set minimum SDK (.java)

android {
compileSdkVersion 28
buildToolsVersion "28.0.2"

defaultConfig {
applicationId "com.myapp.isawesome"
minSdkVersion 25
targetSdkVersion 30

Additional Guidance

Risk and Regulatory Information

Severity: medium CVSS: 6.7

Application

See more detail in the NowSecure Report

lcimeni commented 2 years ago

Update: The fix for this finding has been verified by NowSecure.

Powered by NowSecure Platform