💥
Android Penetration Testing
WEBSITEGITHUBLINKDININSTAGRAM
  • 🕵️‍♂️OWASP Mobile Top 10
    • OWASP Mobile Top 10 2014
    • OWASP Mobile Top 10 2016
    • OWASP Mobile Top 10 2023
      • Insecure Authentication/Authorization
      • Insecure Communication
      • Inadequate Supply Chain Security
      • Inadequate Privacy Controls
      • Insufficient Input/Output Validation
      • Security Misconfiguration
      • Insufficient Cryptography
      • Insecure Data Storage
      • Insufficient Binary Protections
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
    • 👑Basic - Advance
    • 💥Professional - Expert
    • 🟧Types of Mobile Applications
    • 🟣Android Architecture
    • 🟦Android Show
    • 🚀Secrets of Android App Creation
    • ♦️Android's Data Treasure Chests
    • 🛑Mysterious .apk File:
    • 🏹Android Pentesting with Cutting-Edge Tools
    • ⬛Android File System
  • "Let's Dive into the Practical"
  • 😇Vulnerable Android Application with Practical.
    • 😉InsecureShop
      • 😁Vulnerability #1: Insecure Logging
      • 😂Vulnerability #2: Hardcoded Credentials
      • 😆Vulnerability #3: Insecure Data Storage
      • 🤣Vulnerability #4: Lack of SSL Certificate Validation
      • 😍Vulnerability #5: Insufficient URL Validation
      • 😄Vulnerability #6: Weak Host Validation
      • 😘Vulnerability #7: AWS Cognito Misconfiguration
      • 😃Vulnerability #8: Insecure Broadcast Receiver
      • 😛Vulnerability #9: Use of Implicit intent to send a broadcast with sensitive data
      • 😎Vulnerability #10: Using Components with Known Vulnerabilities
      • 😜Vulnerability #11: Intent Redirection (Access to Protected Components)
      • 😂Vulnerability #12: Insecure Webview Properties Enabled
      • 😆Vulnerability #13: Intercepting Implicit intent to load arbitrary URL
      • 🙃Vulnerability #14: Insecure Content Provider
      • 🥰Reading Material
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
    • 🥇Part - 1
    • 🥈Part - 2
    • 🥉Part - 3
    • 🏅Part - 4
    • 🎖️Part - 5
  • 😘Notes
    • Tools to use
    • Important Reports from Hackerone
Powered by GitBook
On this page
  1. Vulnerable Android Application with Practical.
  2. InsecureShop

Vulnerability #5: Insufficient URL Validation

PreviousVulnerability #4: Lack of SSL Certificate ValidationNextVulnerability #6: Weak Host Validation

Last updated 1 year ago

Building up on vulnerabilities related to com.insecureshop.WebViewActivity, we continue to review the logic on how it handles the urls sent via deeplink. Open up the activity on jadx-gui and focus on lines 31-45.

It gets the data from the intent and stores it into the uri variable, continues to check if the path of the uri is one of the following values: /web or /webview.

If we use the /web path, it takes the query parameter ?url from the uri and stores it into the data variable which is being used in webview.loadUrl on line 45. This code block does not properly validate the URLs that are passed, this is a vulnerability since malicious apps can open up any arbitrary website/content.

POC adb command is the same with Vulnerability #4.

C:\Users\Aniket\Downloads\InsecureShop>adb shell am start -a android.intent.action.VIEW -c android.intent.category.BROWSABLE -d insecureshop://com.insecureshop/web?url=https://google.com
Starting: Intent { act=android.intent.action.VIEW cat=[android.intent.category.BROWSABLE] dat=insecureshop://com.insecureshop/web?url=https://google.com }
😇
😉
😍