BLOG
BLOG
Continuing our series on the OWASP Top 10 Project, today we see the next most exploited mobile threat called Security Decisions via Untrusted Inputs.
Developers generally use hidden fields and values or any hidden functionality to distinguish higher level users from lower level users. An attacker can intercept the calls (IPC or web service calls) and temper with such sensitive parameters. Weak implementation of such functionalities leads to improper behavior of an app and even granting higher level permissions to an attacker. This can be easily exploited using something called as hooking.
Here is a nice presentation to help you understand more about the Android permissions model and the basis for this threat to be exploited.
Your mobile application can accept data from all kinds of sources. In most cases this will be an Inter Process Communication (IPC) mechanism.
[ What is IPC? - In computer science, inter-process communication (IPC) is the activity of sharing data across multiple and commonly specialized processes using communication protocols. Typically, applications using IPC are categorized as clients and servers, where the client requests data and the server responds to client requests. ]
In general try and adhere to the following IPC design patterns:
Technical Impact: This vulnerability may lead to privilege escalation providing access of higher authorities and functionalities to an attacker. It can even bypass security mechanisms implemented by the app leading to loss of confidentiality and integrity.
Business Impact: This vulnerability leads to loss of reputation.
At the same time, impacting and harming the integrity and confidentiality.
iOS Specific Examples: