New issue
Advanced search Search tips

Issue 774857 link

Starred by 3 users

Issue metadata

Status: WontFix
Owner: ----
Closed: Oct 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Android
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: File and content access are enabled for WebView (android apk)

Reported by mrraskar...@gmail.com, Oct 15 2017

Issue description

https://play.google.com/store/apps/details?id=com.android.chrome

Hello, I see that you didn't disable file access and content access for WebViews in the following files:

org/chromium/chrome/browser/preferences/PrefServiceBridge.java
org/chromium/chrome/browser/preferences/website/SingleCategoryPreferences.java

You should call these methods before loading any content in your WebViews

webView.getSettings().setAllowFileAccess(false);
webView.getSettings().setAllowContentAccess(false);
It's important because in case of MitM attacker will be able not only spoof content, but also access to all content providers of the app like so: <img src="content://your_authority/123">. Here's example how files can be retrieved http://responsiveandroid.com/2012/02/20/serving-android-webview-resources-with-content-providers.html
Images are not protected by SOP, but other content types weren't tested by me on Androids.

File access should be disabled because attacker can load any shared preference file (/data/data/com.banksimple/shared_prefs/*) in an <iframe> and then make a screenshot of contents using available to everyone (I mean you don't need any special permission to do that) tools. After that characters are to be recognized and data will be stolen

 

Comment 1 by wfh@chromium.org, Oct 16 2017

Cc: finnur@chromium.org
Labels: Needs-Feedback OS-Android
Chrome provides the webview component but does not actually use it, I think the bug(s) here would be in the users of webview, not in Chrome.

Can you explain how an attacker would actually take advantage of this, perhaps with a demo?

Comment 2 by tsepez@chromium.org, Oct 19 2017

Components: Mobile>WebView
Status: WontFix (was: Unconfirmed)
Closing this out since there hasn't been any additional feedback. I believe the assessment in c#1 is correct.
Project Member

Comment 4 by sheriffbot@chromium.org, Feb 1 2018

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment