Security Vulnerabilities in Android Applications
Security Vulnerabilities in Android Applications
Research Online
2018
Peter Hannay
Recommended Citation
Montealegre, C., Njuguna, C., Malik, M. I., Hannay, P., & McAteer, I. (2018). Security vulnerabilities in
android applications. DOI: https://doi.org/10.25958/5c5274d466691
DOI: 10.25958/5c5274d466691
Montealegre, C., Njuguna, C.R., Malik, M.I., Hannay, P., & McAteer, I.N. (2018). Security vulnerabilities in android
applications. In proceedings of the 16th Australian Information Security Management Conference (pp. 14-28).
Perth, Australia: Edith Cowan University.
This Conference Proceeding is posted at Research Online.
https://ro.ecu.edu.au/ism/222
SECURITY VULNERABILITIES IN ANDROID APPLICATIONS
Crischell Montealegre1, Charles Rubia Njuguna1, Muhammad Imran Malik1, Peter Hannay2, Ian Noel McAteer1
1
School of Science, Edith Cowan University, 2Asterisk Information Security
Perth, Australia
[email protected], [email protected], [email protected],
[email protected], [email protected]
Abstract
Privacy-related vulnerabilities and risks are often embedded into applications during their development, with this
action being either performed out of malice or out of negligence. Moreover, the majority of the mobile applications
initiate connections to websites, other apps, or services outside of its scope causing significant compromise to the
oblivious user. Therefore, mobile data encryption or related data-protection controls should be taken into account
during the application development phase. This paper evaluates some standard apps and their associated threats
using publicly available tools and demonstrates how an ignorant user or an organisation can fall prey to such
apps.
Keywords
Android, vulnerability scan, APK, AndroBugs, Ostorlab, Social Media
INTRODUCTION
In recent times, organisations have been deploying mobile applications to facilitate their business processes.
Employees, customers, and vendors experience the exceptional exchange of services increasing productivity in
the working environment through sharing of real-time information, free mobility, and better functionality.
Notwithstanding mobile apps benefits, however, usage of mobile apps can potentially lead to severe security
hitches. Similar to obsolete enterprise applications, apps may contain vulnerabilities prone to attack. An attacker
may exploit these vulnerabilities to gain unauthorised access to an organisation’s information technology
resources or a user’s data (Quirolgico, Voas, Karygiannis, Michael, & Scarfone, 2015).
Literature Review
In the recent past, software delivery to an end user has taken a fundamental paradigm shift with easy-to-download,
install, and use applications from mobile app markets. High-end user demand for Android apps has led to an
increase in the production rate at which applications are developed and released in the market without overseeing
authority. Although these contribute to an equal playing ground for both small organisations and prominent
software development companies, the massive growth of new apps could equally compromise apps’ security.
Deploying new technology could have tragic consequences, causing a potential security threat to an organisation’s
IT resources, data, and users. ANZ Bank in rolling out their new ANZ app while retiring their GoMoney app is
asking users to download and install the new app with their previous registered credentials. While new
technologies may offer the promise of productivity gains and new capabilities, they may also present new risks.
It is vital for an organisation’s IT experts and users to be made fully aware of these risks and either develop plans
to mitigate them or accept their consequences (Coyne, 2018).
Most large active enterprise data has reported having been sporadically leaked from mobile apps. For instance,
Appthority Enterprise mobile security vendor scanned 1100 apps that use a communications Application
Programming Interface (API) marketed by Twilio. Figure 1 illustrates vulnerabilities in apps as exposed in
developers’ hard-coded logs, which shows usernames and passwords credentials in their code (Appthority, 2017).
Background
The purpose of this study is to establish security issues in Android smartphone applications. Android smartphones
store diverse data such as multimedia, sensor data, communication logs, and data created or consumed by
applications, and so on. An Android user carries the device over multiple locations throughout the day and allows
connections to various networks that are often not secure. As the same device may be used for both work and
leisure purposes, installed Android applications often contain a combination of valuable personal and business
data. Exposing potential security vulnerabilities in commonly used Android applications will help understand the
risk associated with mobile apps within corporate premises.
Android smartphones extend the business perimeter, while existing security and privacy perimeter-oriented
mechanisms are inadequate and easily compromised. In this context, the importance of Android applications
interacting with corporate assets, make them economically attractive to attackers. This attraction happens because
most people rarely consider Android-application threats when downloading from the Google Play Store.
Furthermore, most vulnerability-assessment methods are not intended for individuals, but mainly for businesses.
Thus, a targeted vulnerability assessment of Android applications is useful in assessing smartphone threats in a
considerably more specific approach. We contribute towards this direction by identifying security threats on
commonly used social media applications and compare different vulnerability-scanning frameworks tailored for
Android applications.
METHODS
Static analysis
Static analysis is performed without executing the application on the provided or decompiled source code and
accompanying APK files (Velu, 2016). This method indeed proves to be more thorough when using AndroBugs
and Ostorlab frameworks, and cost-efficient with the ability to detect critical and non-critical threats to apps from
the Google Play Store. Static analysis also unearths weakness that would not emerge in a dynamic test. Static
analyses using frameworks are used for:
Planning
The study compared and analysed the outcomes of three different application-scanning frameworks to broadly
gain an understanding of the various risks and vulnerabilities linked with the usage of leading social-media
applications within business perimeters. However, on submission only the results of two frameworks have been
analysed. The application-testing frameworks are:
Google may never employ app security that enforces or rates the security of an app.
Google may never take down vulnerable apps from Google Play.
Scanning Process
The scanning process comprises of three main steps:
1. Generating APK files.
2. Scanning using AndroBugs.
3. Ostorlab framework.
Vulnerability Findings
Vulnerabilities from the frameworks used have been categorised in order of priority and potential impact to the
end user. Table 3 shows the categorisation used for both tools:
AndroBugs Ostorlab
The following vulnerabilities were discovered after running the eight mobile apps. Table 4 summarises the
results from AndroBugs. Vulnerabilities with an Info categorisation, which indicates that there was no issue
found on the specific static analysis, were not included in this table. Table 5 illustrates the results from Ostorlab.
Three apps may be susceptible to the Android SQLite Database Vulnerability (CVE-2011-3901). More so, it is
suggested that all of the apps are using an unsecured way to delete files. By using file.delete(), any attacker,
especially on rooted devices, may recover everything you delete. Also, almost all are using or have API calls to
external data storage. It is imperative to ensure that sensitive information is handled well. It is also worth noting
that the apps are reading the ANDROID_ID, IMEI and deviceID information.
Unencrypted communication
The most important feature of the client-server architecture is information exchange. When data is transmitted, it
may be exchanged through the carrier network or the Internet. While developing an application, if care is not
taken while sharing data between the client and server, there is a chance that the data may be compromised in
transit. The best way to protect data in transit is to encrypt it. Encryption prevents sniffed data from read,
particularly in the case of usernames, passwords, and credit card information. According to OWASP
“Unfortunately, mobile applications frequently do not protect network traffic. They may use SSL/TLS during
authentication, but not elsewhere, exposing data and session IDs to interception. Also, the existence of transport
security does not mean it is implemented to its full potential. Detecting basic flaws is easy. Just observe the phone's
network traffic. More subtle flaws require inspecting the design of the application and the application's
configuration” (OWASP, 2014b).
All apps include URLs that are not using SSL. Referencing the AndroBugs result, WeChat has the most number
of URLs (44), followed by Instagram (16), Twitter (11), IMO (6), Viber (5), LinkedIn and WhatsApp (4), and
Facebook (1). Also, Facebook, Instagram and WhatsApp do not check the validation of the SSL Certificate which
allows self-signed, expired or mismatched Common Name (CN) certificates for SSL.
Known Vulnerabilities
Table 6 shows the known vulnerabilities identified:
CVE-2013-4710 Facebook / IMO / This method can be used to Prior to Android 4.2
Viber / LinkedIn / allow JavaScript to control
Twitter / Instagram / the host application ("CVE-
WeChat 2013-4710," 2013)
CONCLUSION
Organisations face frequent threats to data security and privacy, and prioritising these in the noise of continuously
developing security concerns is difficult. The main focus of this research was to demonstrate vulnerabilities that
exist in commonly used social network apps and analyse the threats with the highest potential impact on the
business environment. The results highlight security issues to be considered by organisations and application
users.
A vulnerable app that has access to corporate data is a potential channel for such threats, and is rarely monitored
when interfacing with the restricted commercial environment. Google Play, with a high volume of apps, largely
REFERENCES
Alliance, C. S. (2012). Security Guidance for Critical Areas of Mobile Computing (CLOUD SECURITY
ALLIANCE Security Guidance for Critical Areas of Mobile Computing, V1.0 ), Mobile Working Group
Appthority. (2017). How a Mobile Developer Error is Exposing Millions of Conversations.
Coyne, A. (2018). ANZ retires Grow, goMoney apps. Retrieved from https://www.itnews.com.au/news/anz-
retires-grow-gomoney-apps-485437
CVE-2011-3901. (2011). Available from National Vulnerability Database Common Vulnerabilities and
Exposures. Retrieved from https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3901
CVE-2013-4710. (2013). Available from National Vulnerability Database Common Vulnerabilities and
Exposures. Retrieved from https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4710
CVE-2013-6271. (2013). Available from National Vulnerability Database Common Vulnerabilities and
Exposures. Retrieved from https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6271
Kaspersky. (2016). Mobile Malware Evolution 2016. Retrieved from
https://securelist.com/files/2017/02/Mobile_report_2016.pdf
Maslennikov, D. (2011). ZeuS-in-the-Mobile for Android. Retrieved from https://securelist.com/zeus-in-the-
mobile-for-android-10/29258/
OWASP. (2014a). Mobile Top 10 2014-M2. Retrieved from
https://www.owasp.org/index.php/Mobile_Top_10_2014-M2
OWASP. (2014b). Mobile Top 10 2014-M3. Retrieved from
https://www.owasp.org/index.php/Mobile_Top_10_2014-M3
Quirolgico, S., Voas, J., Karygiannis, T., Michael, C., & Scarfone, K. (2015). Vetting the Security of Mobile
Applications. doi:10.6028/nist.Sp.800-163
Spreitzenbarth, M. (2013). Forensic Analysis of Android and its malicious Applications.
Velu, V. K. (2016). Mobile Application Penetration Testing.
Zhang, M., & Aimoto, S. (2018). Android Malware Harvests Facebook Account Details. Retrieved from
https://www.symantec.com/blogs/threat-intelligence/android-malware-harvests-facebook-details