Amazon AWS SDK <=2.8.5 for Android uses Android SharedPreferences to store plain text AWS STS Temporary Credentials retrieved by AWS Cognito Identity Service. An attacker can use these credentials to create authenticated and/or authorized requests. Note that the attacker must have "root" privilege access to the Android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing Android's fundamental security mechanisms).
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_03.png | Exploit Third Party Advisory |
https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_02.png | Exploit Third Party Advisory |
https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_01.png | Exploit Third Party Advisory |
https://aws-amplify.github.io/aws-sdk-android/docs/reference/com/amazonaws/auth/CognitoCachingCredentialsProvider.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-04-04 08:29
Updated : 2021-05-10 09:20
NVD link : CVE-2018-19981
Mitre link : CVE-2018-19981
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
amazon
- aws_software_development_kit