Loading HuntDB...

Arbitrary file write triggered by deeplink abuse - MetaMask Android

Medium
M
MetaMask
Submitted None

Team Summary

Official summary from MetaMask

@renekroka and @hackerontwowheels from the [UGWST](https://ugwst.com/) team have found a vulnerability in the MetaMask Android app that allows for arbitrary files to be written to disk. The team demonstrated how attackers can deeplink into MetaMask's in-app browser, and trigger the immediate download of an attacker supplied file. Due to a lack of confirmation prompts, users are not made aware that a download has occurred until after the payload has been downloaded. The MetaMask team would like to once again thank @renekroka and @hackerontwowheels for their excellent find, and for helping make MetaMask more secure.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Business Logic Errors