Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit b6c584c

Browse files
Update docs
1 parent 447e06d commit b6c584c

1 file changed

Lines changed: 6 additions & 8 deletions

File tree

java/ql/src/Security/CWE/CWE-927/SensitiveCommunication.qhelp

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,15 @@
22
<qhelp>
33

44
<overview>
5-
<p>When an implicit intent is broadcast in an Android application, if no reciever application or reciever permission is specified, it is visible to all applications installed on the same mobile device, exposing all sensitive information they contain.</p>
6-
<p>This means that broadcasts that don't specify this are vulnerable to passive eavesdropping or active denial of service attacks.</p>
5+
<p>When an implicit intent is used with a method such as <code>startActivity</code>, <code>startService</code>, or <code>sendBroadcast</code>, it may be read by other applications on the device.</p>
6+
<p>This means that sensitive data in these intents may be leaked.</p>
77
</overview>
88

99
<recommendation>
10-
<p>
11-
Specify a receiver permission or application when broadcasting intents, or switch to
12-
<code>LocalBroadcastManager</code>
13-
or the latest
14-
<code>LiveData</code>
15-
library.
10+
<p>
11+
For <code>sendBroadcast</code> methods, a receiver permission may be specified so that only applications with a certain permission may read recieve the intent;
12+
or a <code>LocalBroadcastManager</code> may be used.
13+
Otherwise, ensure that intents containing sensitive data have an explicit receiver class set.
1614
</p>
1715
</recommendation>
1816

0 commit comments

Comments
 (0)