Passcode Protection in Android Devices Can be Bypassed.
Medium
N
Nextcloud
Submitted None
Actions:
Reported by
ctulhu
Vulnerability Details
Technical details and impact analysis
###What is The Vulnerability?
The Passcode can be bypassed by calling a MainLoginActivity which is com.owncloud.android.ui.activity.FileDisplayActivity , We have successfully bypassed the passcode and are redirected to the App's User Interface.
of the user’s credentials:
Android Version: 9
Non Rooted Device.
##How to Reproduce:
1.) Setup a Emulated Device Via Android Studio AVD Using the Same Setup.
{F518191}
2.) Install NextCloud Client and Login Your NextCloud Account.
{F518192}
3.) Setup the PassCode
{F518193}
4.) Install Drozer and Drozer Agent
* https://labs.mwrinfosecurity.com/tools/drozer/
5.) Start the Drozer Embedded Server
{F518195}
6.) Open your CMD/Console and type ```drozer console connect```
█████████
7.) Close the NextCloud Client and Open it Again
{F518197}
8.) Go Back to Drozer Console and run this code
```run app.activity.start --component com.nextcloud.client com.owncloud.android.ui.activity.FileDisplayActivity```
9.) Voila, Passcode Bypassed
{F518198}
##Supporting Materials
* Attached as poc.mp4
█████
## Impact
Successful exploitation of this vulnerability allows an attacker to bypass the android application's authentication mechanisms and gain unauthorized access to the user files and infos.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Violation of Secure Design Principles