Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CVE ASSIGNED: CVE-2025-45081
- CVE PUBLISHED STATE: PUBLISHED
- CVE LINK: https://nvd.nist.gov/vuln/detail/CVE-2025-45081
- Description:
- An issue in IITB SSO Android App v1.1.0 exists due to android:allowBackup="true" being declared in the AndroidManifest.xml file. This misconfiguration enables unauthorized access to the application's internal storage via Android Debug Bridge (ADB), without requiring device root access. An attacker with physical access and USB debugging enabled can extract sensitive data, including authentication tokens, user sessions, and configuration files, leading to a privacy violation and potential account compromise.
- Impact:
- 1.Unauthorized access to user credentials and authentication tokens
- 2.Disclosure of sensitive application data stored locally
- 3.Violation of institutional data protection guidelines
- 4.Elevated risk of session hijacking and reverse engineering
- 5.Degradation of the app’s security posture
- Attack Scenario:
- 1.Attacker gains physical access to the user’s Android device
- 2.Enables USB debugging (if not already enabled)
- 3.Connects the device via USB to a computer
- 4.Executes ADB backup command: adb backup -apk -f sso_backup.ab in.ac.iitb.sso
- 5.Extracts sensitive application data from the .ab file (e.g., shared_prefs/, databases/)
- 6.Analyzes the cleartext contents to obtain user session data and configuration details
- Affected Products:
- 1.App Name: IITB SSO
- 2.Package: in.ac.iitb.sso
- 3.Version: 1.1.0
- 4.Play Store / Source: https://play.google.com/store/apps/details?id=in.ac.iitb.sso
- Vendor Information:
- 1.Vendor: Indian Institute of Technology Bombay
- 2.Project: IITB SSO Android App
- 3.Website: https://www.iitb.ac.in/
- Proof of Concept (PoC):
- 1.Enable USB Debugging on the device
- 2.Connect the device to a computer via ADB
- 3.Run the command: adb backup -apk -f sso_backup.ab in.ac.iitb.sso
- 4.Use tools like Android Backup Extractor (ABE) to convert .ab to .tar
- 5.Inspect shared_prefs/, databases/, and other extracted files
- 6.PoC at - https://ibb.co/Z6tn5jxK
- Impact:
- High
- Discoverer:
- Ishwar Kumar
Advertisement
Add Comment
Please, Sign In to add comment