Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Dirty Stream Flaw Present in Android Apps with Millions of Downloads

    Dirty Stream Flaw Present in Android Apps with Millions of Downloads

    May 3, 2024

    Researchers have discovered that several popular Android applications in the Google Play Store with millions, even a billion downloads are susceptible to a path traversal-related vulnerability that is being referred to as the ‘Dirty Stream Flaw’.

    In the recently-released report, the Microsoft Threat Intelligence team, stated, “The implications of this vulnerability pattern include arbitrary code execution and token theft, depending on an application’s implementation.”

    Successful exploitation of this vulnerability could allow an attacker to take full control of the application’s behavior and leverage the stolen tokens to gain unauthorized access to the victim’s online accounts and other data.

    Xiaomi File Manager and WPS Office Vulnerable to Dirty Stream Flaw

    The bug stems from the Android FileProvider class, a subclass of the ContentProvider class which is used to facilitate file sharing or picking between different applications while still maintaining secure isolation between each other.

    A correct implementation would provide a reliably solution for file sharing between applications, while an improper implementation could be exploited to bypass typical read/write restrictions or overwrite critical files within Android.

    While the researchers identified several applications potentially vulnerable to the attack and representing over 4 billion downloads together, they suspect that the vulnerability may be present in other applications. The Xiaomi Inc.’s File Manager (com.mi. Android.globalFileexplorer) with a billion downloads and WPS Office (WPS Office (cn.wps.moffice_eng) with over 500 million downloads are two prominent examples among the identified applications.

    The vulnerabilities were reported by the researchers to the Xiaomi, Inc. and WPS Office security teams, who deployed fixes for these apps on February 2024 with Xiaomi published version V1-210593 of it’s file manager application and version 17.0.0 of WPS Office. Users are advised to keep their device and installed applications up to date.

    The researcher stated that their motive behind the publication of the research was to prompt developers and publishers to check if their apps were affected and issue fixes accordingly.

    Dirty Stream Flaw Could Permit Overwrite &  Data Exfiltration

    If successfully exploited, the vulnerability could permit an attacker to overwrite the target app’s configuration file and force it to communicate with an attacker-controlled server, potentially leading to the exfiltration sensitive information and arbitrary command execution.

    The researchers behind the findings also collaborated with Google to publish an official guidance on Android Developers website, stating appreciation for the partnership with the Google’s Android Application Security.

    The Android developer guidance issued by Google, urges developers to handle the filename provided by the server application properly while ignoring filenames provided by the server applications rather than internally generated unique filename identifier as the filename, stating that there should be a sanitization check if internally-provided identifiers were not possible.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWorld Password Day: Experts Warn of Weak Passwords, Offer Security Tips
    Next Article How to load chrome profile with Selenium correctly?

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Don’t miss this deal on a free Samsung Galaxy Watch 6 – here’s how to qualify

    Development

    Windows 11 24H2 KB5050009 issues break audio, camera. KB5050021 affected too

    Operating Systems

    xLSTM: Enhancing Long Short-Term Memory LSTM Capabilities for Advanced Language Modeling and Beyond

    Development

    Enterprise conversation intelligence: The power of superior speech AI

    Artificial Intelligence

    Highlights

    Development

    Create/Deploy Azure Kubernetes Service (AKS) Using Terraform Cloud Workspaces

    January 10, 2025

    Objective Automate the deployment of Azure Kubernetes Service (AKS) using Terraform Cloud Workspaces. This ensures…

    CVE-2025-46553 – Misskey/summaly Allow Redirects Bypass Vulnerability

    May 5, 2025

    White-Label AI Website Builder

    May 23, 2024

    Cracking the Privacy Paradox in AI: Innovate Without Invading

    January 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.