Author Topic: Android apps with 250M downloads still vulnerable to patched bug  (Read 75 times)

Offline javajolt

  • Administrator
  • Hero Member
  • *****
  • Posts: 35213
  • Gender: Male
  • I Do Windows
    • windows10newsinfo.com
Android apps with 250M downloads still vulnerable to patched bug
« on: December 03, 2020, 05:12:55 PM »
Android apps with over 250 million downloads are still susceptible to a severe vulnerability in a Google library that was patched in August 2020.

In August, mobile app security company Oversecured discovered a vulnerability in the Google Play Core Library that allowed malicious applications to execute code in legitimate apps.

These malicious executables would then run under the legitimate app's security permissions, allowing it to monitor and steal data being entered into the app or transmitted by it.

This vulnerable library is used to update an app's components at runtime through the Google API. This library is used by many popular apps, including Chrome, Edge, Facebook, Instagram, WhatsApp, and Snapchat.

Tracked as CVE-2020-8913, the vulnerability was assigned an 8.8 (High) rating and was fixed by Google in Google Play Core Library version 1.7.2.

Many apps continue to use a vulnerable version

Researchers from Check Point Research have discovered that there are still apps with millions of installs using the vulnerable library over three months later.

"Since the publication of this vulnerability, we started monitoring vulnerable applications. During the month of September 2020, 13% of Google Play applications analyzed by SandBlast Mobile used this library, and 8% of those apps had a vulnerable version," Check Point Research stated in their report.

This is worrisome, as according to the researchers, the Google Play Core Library vulnerability is trivial to exploit.

"All you need to do is to create a “hello world” application that calls the exported intent in the vulnerable app to push a file into the verified files folder with the file-traversal path. Then sit back and watch the magic happen," Check Point explains.


CVE-2020-8913 attack flow Source: Check Point Research

To illustrate how easy it is to exploit this vulnerability, Check Point created a video demonstrating it in action, shown below.



Below is a list of some of the vulnerable applications discovered by Check Point. As you can see, all of these apps have at least 1 million downloads, with one as high as 100 million downloads.



As the Google Play Core Library can not be auto-updated by Google, developers must manually download a new version and update their apps with it. Their apps will continue to be vulnerable and potentially exploited by threat actors to steal data and passwords or perform malicious activity until they do.

Unfortunately, even after Check Point notified each of the developers about their apps' vulnerability, the researchers said only Viber and Booking released fixed versions.

source