Loading HuntDB...

Passcode Protection in Android Devices Can be Bypassed.

Medium
N
Nextcloud
Submitted None
Reported by ctulhu

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
###What is The Vulnerability? The Passcode can be bypassed by calling a MainLoginActivity which is com.owncloud.android.ui.activity.FileDisplayActivity , We have successfully bypassed the passcode and are redirected to the App's User Interface. of the user’s credentials: Android Version: 9 Non Rooted Device. ##How to Reproduce: 1.) Setup a Emulated Device Via Android Studio AVD Using the Same Setup. {F518191} 2.) Install NextCloud Client and Login Your NextCloud Account. {F518192} 3.) Setup the PassCode {F518193} 4.) Install Drozer and Drozer Agent * https://labs.mwrinfosecurity.com/tools/drozer/ 5.) Start the Drozer Embedded Server {F518195} 6.) Open your CMD/Console and type ```drozer console connect``` █████████ 7.) Close the NextCloud Client and Open it Again {F518197} 8.) Go Back to Drozer Console and run this code ```run app.activity.start --component com.nextcloud.client com.owncloud.android.ui.activity.FileDisplayActivity``` 9.) Voila, Passcode Bypassed {F518198} ##Supporting Materials * Attached as poc.mp4 █████ ## Impact Successful exploitation of this vulnerability allows an attacker to bypass the android application's authentication mechanisms and gain unauthorized access to the user files and infos.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Violation of Secure Design Principles