Friday, December 6, 2024
HomeAndroidSHAREit App Vulnerabilities Allows Hackers to Bypass Android Device Authentication & Download...

SHAREit App Vulnerabilities Allows Hackers to Bypass Android Device Authentication & Download Arbitrary Files Remotely

Published on

SIEM as a Service

Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and download the arbitrary files in victims device.

SHAREit is data sharing cross-platform application for Android, iOS, PC & Mac and the app downloaded by nearly 500 Million users since 2013 when the app was launched.

SHAREit mainly using 2 Command Channel (Port 55283), Download Channel (Port 2999) different channel to communicate the devices and share the data with each other.

- Advertisement - SIEM as a Service

Command channel is a regular TCP channel that help to communicate 2 devices each other using raw socket connections including connection health check, handling the file Transfer request.

Download channel implemented its own HTTP server by SHAREit that helps clients to download the received files in another end.

SHAREit App Vulnerabilities

The first vulnerability in the SHAREit app <= v 4.0.38 allows attackers to download the authenticated arbitrary file dues to improper validation in msgid, a unique identifier for each request to make sure that download request was originally initiated by the sender.

In this case, whenever the user initiated the download request from the SHAREit app then the SHAREit client will send the GET request to the HTTP server. here how it looks link,

http://shareit_sender_ip:2999/download?metadatatype=photo&metadataid=1337&filetype=thumbnail&msgid=c60088c13d6

Above link contains a 4 different parameter and identifier, each has its own operation including to defines what resource we are trying to download (metadatatype), representing asset id in Android MediaStore ( metdataid) , define the Preview of the resource (filetype ) and each request to make sure that download request was originally initiated by the sender( msgid ).

Here the interesting part is that the application fails to validate msgid parameter that allows a malicious client with a valid session to download any resource by directly referencing its identifier.

In this case, sometimes getting a valid session would trigger the alarms when they see unusual session and limiting that would decrease success rate. so here we move to second vulnerability.

Authentication bypass, a Second vulnerability allows SHAREit <= v4.0.34 exhibited a very odd behavior that lead to bypass the device authentication.

During the exploitation Phase, to have the exact path of the target file leads to easily exploit the device and download the files but its not a usual case.

In this case, two( SHAREit History, SHAREit MediaStore Database) distinct database files related to SHAREit application may be useful to make the exploitation easy.

Here SHAREit MediaStore database containing interesting information about files in the system including file name, type, size, path and more other information.

SHAREit App

According to Redforce research, We created a base exploit toolkit which we used to create two distinct proofs of a concept dubbed “DUMPit!”, one with a user-friendly GUI that enables you to choose your target and what information you want to fetch, and an auto-pwn module where it automatically detects SHAREit or open WiFi networks.

Here the proof-of-concept video for SHAREit remote file download with authentication bypass.

https://youtu.be/xzoJXBCznWc

This vulnerability was originally discovered on back to December 2017 and the silent fix was done but SHAREit team refusing to disclose the exact patched version nor assign CVE numbers to discovered vulnerabilities. Exploit can be downloaded from thisGitHub repository.

Related Read

A New Critical RCE Vulnerability in LibreOffice that Exploit Windows & Linux Systems

SpeakUp – A New Undetected Backdoor Exploiting Six Linux Distributions With Known Vulnerabilities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...