Fix Implicit Intent Vulnerability
Closed this issue · 4 comments
Describe the bug
We got the following error in Google Play Store:
These links give more info about the error and fixes:
- Remediation of Implicit Internal Intent Vulnerability
- CWE-927: Use of Implicit Intent for Sensitive Communication
- Security tips: Use of intents
Applications that send broadcasts without specifying the broadcast target may have
these broadcasts intercepted by malicious apps on the same device.
(source: Android_app_vulnerability_classes.pdf)
Additional context
Possibly introduced in this PR.
This is ready for AT in this PR, please consider to test these issues mentioned here.
We can't replicate, in our local, the same "Implicit Intent Vulnerability" error from Play Store. The lint and the static check tools aren't detecting it, it's a check from Play Store. Once we ensure this fix didn't affect badly the existing functionality, then we're going to release and deploy to Play Store, wait until it finishes the Play Store's checks and finally see if the error appears again.
Config: Covid-19
Environment: Local with Docker helper script
cht-core version: master
Platform: Mobile App. APK generated with branch 282-Fix_Implicit_Intent_Vulnerability
Test - Ticket #163
Test scenario:
Tested with four different phones. Removed internet connection to see the page indicating the error, after it was connected again to the internet, click on Retry
, and the login page was displayed successfully.
Test - Ticket #148
Test scenario:
Tested with four different phones. Using the RDT Covid-19 - Provision form, the location
and storage
disclosures were displayed successfully.