Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
    Dublin
  • County:
    Dublin
  • Country:
    Ireland
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App

July 1, 2022
Amazon

Amazon.com, in December 2021, covered a high seriousness susceptability impacting its Photos app for Android that might have been made use of to swipe an individual’s gain access to symbols.

” The Amazon.com gain access to token is made use of to confirm the individual throughout numerous Amazon.com APIs, a few of which consist of individual information such as complete name, e-mail, as well as address,” Checkmarx scientists João Morais as well as Pedro Umbelinosaid “Others, like the Amazon.com Drive API, permit an enemy complete accessibility to the individual’s data.”

The Israeli application protection screening firm reported the concern to Amazon.com on November 7, 2021, complying with which the technology titan turned out a choose December 18, 2021.

The leakage is the outcome of a misconfiguration in among the application’s elements called “com.amazon.gallery.thor.app.activity.ThorViewActivity” that’s specified in the AndroidManifest.xml file as well as which, when released, launches an HTTP demand with a header including the gain access to token.

Amazon Photo App vulnerability

Essentially, it implies that an outside application might send out an intent— a message to promote interaction in between applications– to introduce the prone task concerned as well as reroute the HTTP demand to an attacker-controlled web server as well as essence the gain access to token.

CyberSecurity

Calling the pest a situation of damaged verification, the cybersecurity firm claimed the concern might have made it possible for destructive applications mounted on the tool to get the gain access to symbols, providing the assailant authorizations to take advantage of the APIs for follow-on tasks.

This might differ from erasing data as well as folders in Amazon.com Drive to also making use of the accessibility to organize a ransomware assault by analysis, securing, as well as re-writing a sufferer’s data while eliminating their background.

Checkmarx better kept in mind that the susceptability could have had a wider influence considered that the APIs made use of as component of its proof-of-concept (PoC) comprise just a tiny part of the whole Amazon.com environment.

Posted in SecurityTags:
Write a comment