![]() ![]() ![]() Trend Micro claims that "an attacker may craft a fake file, then replace those files via the aforementioned vulnerability to perform code execution. This allows third-party apps to edit the data ShareIt uses to run, including the app cache generated during install and runtime. In effect, this vulnerability allows attackers to call on ShareIt's file-content provider and pass it a file path to get access to all of its data files. ![]() However, the developers behind ShareIt haven't given much thought to limit the app's content-provider capabilities, which can give attackers access to all files in ShareIt's "private" directory. It's up to developers to sanitize these cross-app capabilities and only expose the necessary file manager capabilities to Gmail and other apps." If Gmail wants to attach a file to an email, it can do that by showing a list of available file-content providers installed on your phone (it's basically an "open with" dialog box), and the user can pick their favorite file manager, navigate through their storage, and pass the file they want to Gmail. The publication notes: "Android prides itself on intra-app communication, partly because any app can create a content provider and provide its content and services to other apps. Also the question is, how do I open a SHAREit file on my iPhone On the iOS device, go to Settings > Wi-Fi. Select the files that you want to transfer and tap on Send. Elaborating on one of the vulnerabilities, Ars Technica reveals that ShareIt has one common Android app vulnerability that can give attackers read/write access to all of its files. First, you’ll need to install Shareit and start it up. ![]()
0 Comments
Leave a Reply. |