Yandex Mobile App vulnerable to Insecure Data storage
Last updated
Last updated
********
This is an older post (written around ~2015) and ported from my old blog. Please excuse if there are any mistakes or inaccuracies. If you find any issues, please head over to the home page > contact me. Thanks.
********
Hey Fellas, Hope your doing great! It’s been a while i’ve been active online.. I’m being through a hectic schedule of exams. Still would like to take time sharing one of my find on Yandex.Mail Application. The Yandex Mail Application can be found here. Fine, Let me get into the description of the vulnerability. The vulnerability goes with the name of “Insecure Data Storage”. You can find more information just by googling the name yet i’ve added some references at the end of the post ;) The vulnerability exists because the data which the developer is storing locally is not being stored in a secure manner.
How to exploit this issue? Well, The question comes to everyone’s mind that how to exploit.. The attack scenario goes like this :- The attacker creates a malicious application which steals the text that is present in the local storage. So, The victim creates his account but doesn’t realise that his phone has the virus and as soon as the victim creates, the attacker steals and uploads it to a remote server and reads it there. See this for more information on how to exploit this issue.This is an excellent article and a good guide which i suggest for newbies in the Mobile Applcation security field.
How to patch this type of issues? Well, The answer is just don’t store the credentials in clear text in the local storage.
Reference:- https://www.owasp.org/index.php/Mobile_Top_10_2014-M2