You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-927/SensitiveBroadcast.qhelp
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -4,16 +4,16 @@
4
4
<qhelp>
5
5
6
6
<overview>
7
-
<p>Broadcasted intents in an Android application are visible to all applications installed on the same mobile device, exposing all sensitive information they contain.</p>
8
-
<p>Broadcasts are vulnerable to passive eavesdropping or active denial of service attacks when an intent is broadcasted without specifying any receiver permission or receiver application.</p>
7
+
<p>Broadcast intents in an Android application are visible to all applications installed on the same mobile device, exposing all sensitive information they contain.</p>
8
+
<p>Broadcasts are vulnerable to passive eavesdropping or active denial of service attacks when an intent is broadcast without specifying any receiver permission or receiver application.</p>
9
9
</overview>
10
10
11
11
<recommendation>
12
-
<p>Specify receiver permission or specify receiver application in broadcasted intents, or switch to <code>LocalBroadcastManager</code> or the latest <code>LiveData</code> library.</p>
12
+
<p>Specify a receiver permission or application when broadcasting intents, or switch to <code>LocalBroadcastManager</code> or the latest <code>LiveData</code> library.</p>
13
13
</recommendation>
14
14
15
15
<example>
16
-
<p>The following example shows two ways of broadcasting intents. In the 'BAD' case, no "receiver permission" is specified. In the 'GOOD' case, "receiver permission" is specified.</p>
16
+
<p>The following example shows two ways of broadcasting intents. In the 'BAD' case, no "receiver permission" is specified. In the 'GOOD' case, "receiver permission" or "receiver application" is specified.</p>
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-927/SensitiveBroadcast.ql
+78-39Lines changed: 78 additions & 39 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
/**
2
-
* @name Use of Implicit Intent for Sensitive Communication
2
+
* @name Broadcasting sensitive data to all Android applicationss
3
3
* @id java/sensitive-broadcast
4
4
* @description An Android application uses implicit intents to broadcast sensitive data to all applications without specifying any receiver permission.
5
5
* @kind path-problem
@@ -10,41 +10,48 @@
10
10
import java
11
11
import semmle.code.java.frameworks.android.Intent
12
12
import semmle.code.java.dataflow.TaintTracking
13
-
import DataFlow
14
-
import PathGraph
15
13
16
14
/**
17
-
* Gets a regular expression for matching names of variables that indicate the value being held contains sensitive information.
15
+
* Gets a regular expression for matching common names of variables that indicate the value being held contains sensitive information.
0 commit comments