Issue metadata
Sign in to add a comment
|
Security: File and content access are enabled for WebView (android apk)
Reported by
mrraskar...@gmail.com,
Oct 15 2017
|
||||||||||||||||||||||
Issue descriptionhttps://play.google.com/store/apps/details?id=com.android.chrome Hello, I see that you didn't disable file access and content access for WebViews in the following files: org/chromium/chrome/browser/preferences/PrefServiceBridge.java org/chromium/chrome/browser/preferences/website/SingleCategoryPreferences.java You should call these methods before loading any content in your WebViews webView.getSettings().setAllowFileAccess(false); webView.getSettings().setAllowContentAccess(false); It's important because in case of MitM attacker will be able not only spoof content, but also access to all content providers of the app like so: <img src="content://your_authority/123">. Here's example how files can be retrieved http://responsiveandroid.com/2012/02/20/serving-android-webview-resources-with-content-providers.html Images are not protected by SOP, but other content types weren't tested by me on Androids. File access should be disabled because attacker can load any shared preference file (/data/data/com.banksimple/shared_prefs/*) in an <iframe> and then make a screenshot of contents using available to everyone (I mean you don't need any special permission to do that) tools. After that characters are to be recognized and data will be stolen
,
Oct 19 2017
,
Oct 25 2017
Closing this out since there hasn't been any additional feedback. I believe the assessment in c#1 is correct.
,
Feb 1 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by wfh@chromium.org
, Oct 16 2017Labels: Needs-Feedback OS-Android