Yandex Mobile App vulnerable to Insecure Data storage
********
This is an older post (written around ~2015) and ported from my old blog. Please excuse if there are any mistakes or inaccuracies. If you find any issues, please head over to the home page > contact me. Thanks.
********
Vulnearbility on Yandex.Mail Mobile application - Allows to hack into newly created accounts created using the app
Hey Fellas, Hope your doing great! Itās been a while iāve been active online.. Iām being through a hectic schedule of exams. Still would like to take time sharing one of my find on Yandex.Mail Application. The Yandex Mail Application can be found here. Fine, Let me get into the description of the vulnerability. The vulnerability goes with the name of āInsecure Data Storageā. You can find more information just by googling the name yet iāve added some references at the end of the post ;) The vulnerability exists because the data which the developer is storing locally is not being stored in a secure manner.
How to exploit this issue? Well, The question comes to everyoneās mind that how to exploit.. The attack scenario goes like this :- The attacker creates a malicious application which steals the text that is present in the local storage. So, The victim creates his account but doesnāt realise that his phone has the virus and as soon as the victim creates, the attacker steals and uploads it to a remote server and reads it there. See this for more information on how to exploit this issue.This is an excellent article and a good guide which i suggest for newbies in the Mobile Applcation security field.
How to patch this type of issues? Well, The answer is just donāt store the credentials in clear text in the local storage.
Reference:- https://www.owasp.org/index.php/Mobile_Top_10_2014-M2
Last updated