Click here for free TV! Chaining bugs to takeover Wind Vision accounts

Click here for free TV! Chaining bugs to takeover Wind Vision accounts Last year, while playing around with the Wind Vision mobile application, I noticed that the login process was implemented in a potentially risky way. I decided to take a look, which led to an in-depth analysis over the course of two months. In brief, I found a way for a malicious app to takeover the victim's Wind Vision account, by chaining a series of otherwise unimportant bugs, starting with just one wrong click. As a note, the issues have already been responsibly disclosed to Wind and the software vendor, and the app was recently updated to prevent the attack.

This post aims to highlight the caveats of authentication flows and inter-process communications (IPC) for mobile application developers, and to also outline the overall risk imposed by these flaws to end users.

Read more…

Wind Vision Android Application: Multiple Vulnerabilities

Wind Vision Android Application: Multiple Vulnerabilities Wind Vision is a digital television service offered by WIND Hellas, a Greek telecommunication provider, allowing for streaming of digital content. The Wind Vision mobile application, available for Android and iOS devices, allows users to watch TV 'on the go' from their smartphone devices.

The Wind Vision Android application is available on Google Play Store. The latest version currently available at the time of writing (10.0.16) was found vulnerable to four security issues. The vulnerabilities could be combined into an attack chain that would allow a malicious third party application to takeover a victim user's account. After compromising a legitimate account, an adversary could proceed to download and watch TV content abusing the victim’s subscription, or deny the victim access to their account by changing the PIN code and replacing registered devices.

Read more…

Xiaomi Redmi 5 Plus: Second Space Password Bypass

Xiaomi Redmi 5 Plus: Second Space Password Bypass Xiaomi Second Space replaces Android User Profiles on MIUI devices. It allows for a Primary (admin) and a Second user to switch profiles via an icon on the homescreen or from the lock screen. Both user spaces can be protected by a PIN or password.

A method was discovered in the Xiaomi MIUI System, that allows a user to switch between spaces without providing a password or PIN. This requires Second Space and Password / PIN screen lock to be enabled along with USB debugging.The vulnerability is triggered by an ADB command which can immediately switch space without requiring input of the password.

Read more…

Debugging React Native Apps You Didn't Write

Debugging React Native Apps You Didn't Write This article presents a novel technique for dynamic analysis of Android applications written with the React Native framework, from a complete black-box perspective. It’s also a story of failure, as my original intention was to achieve full-blown debugging with breakpoints and live-editing in Chrome. Eventually I proved why this is not possible and settled half-way with just live-editing from any editor

Read more…