当前位置:网站首页>[error record] Android application security detection vulnerability repair (strandhogg vulnerability | set activity component android:taskaffinity= "")

[error record] Android application security detection vulnerability repair (strandhogg vulnerability | set activity component android:taskaffinity= "")

2022-06-11 01:53:00 Hanshuliang





One 、 Error message



Check whether the application exists StrandHogg Loophole :

StrandHogg  It's an existence in  Android  Application vulnerabilities in multitasking systems . this 
 Exploit  APP  Inventory file  AndroidManifest.xml  in 
android:taskAffinity  Property settings for , Make installed in  Android  Evil on the equipment 
 An application can be disguised as any other application on the device , Including those requiring privileges 
 Any system application . When the user clicks the normal application icon , Malicious programs can block 
 Intercept and hijack this task , And pretend to be the interface of a normal application , So as to steal the user's 
 sensitive data . At the same time, malicious applications can also impersonate normal applications and request permission from users ,
 Include  SMS、 Photo 、 A microphone and  GPS  etc. , This allows attackers to access SMS and 
 Mail list 、 View Album 、 Eavesdropping and tracking the victim, etc .

 Insert picture description here

The report information generated during the above-mentioned inspection





Two 、 Revise the plan



stay AndroidManifest.xml In manifest file , Set all Activity Affinity properties of components :

android:taskAffinity=""

If there is direct setting of affinity attribute , If none is set to an empty string ;

原网站

版权声明
本文为[Hanshuliang]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/162/202206110036327726.html