
- TREND MICRO ANDROID SHAREIT PLAY MOVIE
- TREND MICRO ANDROID SHAREIT PLAY INSTALL
- TREND MICRO ANDROID SHAREIT PLAY ANDROID
- TREND MICRO ANDROID SHAREIT PLAY CODE
TREND MICRO ANDROID SHAREIT PLAY INSTALL
app install files need to be protected in private storage before they are installed, but in public storage, the install package could be swapped out as soon as it is downloaded but before install time. With its private storage no longer being "private," it repeats the same mistakes we saw in Epic's Fornite installer. It downloads app install files to world-readable storage, where they are vulnerable to a "Man-in-the-disk" attack.
TREND MICRO ANDROID SHAREIT PLAY ANDROID
ShareIt also comes with its own Android app installer.
TREND MICRO ANDROID SHAREIT PLAY CODE
The report says "An attacker may craft a fake file, then replace those files via the aforementioned vulnerability to perform code execution." Normally these files live in private storage, but ShareIt's private storage is open to the world. The file paths ShareIt will offer up are limited to its own data files, but that means apps can edit the data ShareIt uses to run, including the app cache that gets generated during install and runtime. A malicious developer needs to only call on the ShareIt's file-content provider and pass it a file path for the developer to get back any of the files that make up the ShareIt app. This indicates that any third-party entity can still gain temporary read/write access to the content provider's data." Passing along some permissions is normal, but Trend Micro found that ShareIt doesn't try to scope down its permissions at all, and will happily serve up its files up to any app that asks. The report says "The developer behind this disabled the exported attribute via android:exported="false", but enabled the android:grantUriPermissions="true" attribute. If Gmail wants to attach a file to an email, it can do that by showing a list of available file-content providers installed on your phone (it's basically an "open with" dialog box), and the user can pick their favorite file manager, navigate through their storage, and pass the file they want to Gmail. It's up to developers to sanitize these cross-app capabilities and only expose the necessary file manager capabilities to Gmail and other apps.įurther ReadingFortnite’s Android vulnerability leads to Google/Epic Games spatShareIt doesn't seem to have given much thought to the need to sanitize its content-provider capabilities. Android prides itself on intra-app communication, partly because any app can create a content provider and provide its content and services to other apps. One problem is a common Android app vulnerability that arises when developers set up a content provider incorrectly. Trend Micro's report details a laundry list of bad decisions made while designing ShareIt that could make it more susceptible to malicious code. Advertisement When private storage isn’t private ShareIt's website (which, just like the app, does not default to HTTPS) says the service is "now a leading content platform" and popular in Southeast Asia, South Asia, the Middle East, Africa, and Russia.
TREND MICRO ANDROID SHAREIT PLAY MOVIE
The app was considered one of the best for local file sharing, but today the Play Store listing shows an app that offers "Infinite Online Videos," "Tens of millions of high-quality songs," "GIFs, Wallpapers & Stickers," a "popular" media section that looks like a social network, a game store, a retail movie download section, COVID-19 check-in activity and case statistics, and what looks like its own form of currency. ShareIt's incredible success of a billion Android downloads and 1.8 billion users worldwide (there are also iOS, Windows, and Mac apps) has led to what looks like an incredible amount of app bloat. The security firm says it shared these vulnerabilities with ShareIt three months ago, but the company has yet to issue patches.

Trend Micro says compromising the app can lead to remote code execution. It can delete apps, run at startup, create accounts and set passwords, and do a whole lot more.

According to the Play Store permissions readout, ShareIt requests access to the entire user storage and all media, the camera and microphone, and location. The report says ShareIt's vulnerabilities can "be abused to leak a user's sensitive data and execute arbitrary code with ShareIt permissions." ShareIt's permissions, as a local file-sharing app, are pretty extensive.
