H4cKr1337

CVE-2025-45081 - FULL DISCLOSURE

Jun 29th, 2025
462
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.06 KB | Cybersecurity | 0 0
  1. CVE ASSIGNED: CVE-2025-45081
  2. CVE PUBLISHED STATE: PUBLISHED
  3. CVE LINK: https://nvd.nist.gov/vuln/detail/CVE-2025-45081
  4.  
  5. Description:
  6. An issue in IITB SSO Android App v1.1.0 exists due to android:allowBackup="true" being declared in the AndroidManifest.xml file. This misconfiguration enables unauthorized access to the application's internal storage via Android Debug Bridge (ADB), without requiring device root access. An attacker with physical access and USB debugging enabled can extract sensitive data, including authentication tokens, user sessions, and configuration files, leading to a privacy violation and potential account compromise.
  7.  
  8. Impact:
  9. 1.Unauthorized access to user credentials and authentication tokens
  10. 2.Disclosure of sensitive application data stored locally
  11. 3.Violation of institutional data protection guidelines
  12. 4.Elevated risk of session hijacking and reverse engineering
  13. 5.Degradation of the app’s security posture
  14.  
  15. Attack Scenario:
  16. 1.Attacker gains physical access to the user’s Android device
  17. 2.Enables USB debugging (if not already enabled)
  18. 3.Connects the device via USB to a computer
  19. 4.Executes ADB backup command: adb backup -apk -f sso_backup.ab in.ac.iitb.sso
  20. 5.Extracts sensitive application data from the .ab file (e.g., shared_prefs/, databases/)
  21. 6.Analyzes the cleartext contents to obtain user session data and configuration details
  22.  
  23.  
  24. Affected Products:
  25. 1.App Name: IITB SSO
  26. 2.Package: in.ac.iitb.sso
  27. 3.Version: 1.1.0
  28. 4.Play Store / Source: https://play.google.com/store/apps/details?id=in.ac.iitb.sso
  29.  
  30. Vendor Information:
  31. 1.Vendor: Indian Institute of Technology Bombay
  32. 2.Project: IITB SSO Android App
  33. 3.Website: https://www.iitb.ac.in/
  34.  
  35. Proof of Concept (PoC):
  36. 1.Enable USB Debugging on the device
  37. 2.Connect the device to a computer via ADB
  38. 3.Run the command: adb backup -apk -f sso_backup.ab in.ac.iitb.sso
  39. 4.Use tools like Android Backup Extractor (ABE) to convert .ab to .tar
  40. 5.Inspect shared_prefs/, databases/, and other extracted files
  41. 6.PoC at - https://ibb.co/Z6tn5jxK
  42.  
  43. Impact:
  44. High
  45.  
  46. Discoverer:
  47. Ishwar Kumar
Advertisement
Add Comment
Please, Sign In to add comment