Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. This issue has been patched in version 2.11.0.Īpktool is a tool for reverse engineering Android APK files. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. React-native-mmkv is a library that allows easy use of MMKV inside React Native applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |