075 – Unauthorized access to files - APK Content Provider
Description
The Content Provider API allows third party applications installed in the device to retrieve data stored by the application. Access to this data must not be allowed to all applications by default. Instead, (and only if required) specific allow-lists must be used.
Impact
Leak application information to all applications installed in the device through the Content Provider API.
Recommendation
- Deny access to all Content Providers with: android:exported=false and android:grantUriPermissions=false. If required you can allow specific Content Providers by using grant-uri-permission. - If the attribute android:grantUriPermissions=true is required, establish a custom permission using the permission tag with a Signature protection level.
Threat
Unauthorized local attacker owner of a third party application installed in the device.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: L
- Attack complexity: H
- Attack Requirements: N
- Privileges required: N
- User interaction: A
- Confidentiality (VC): L
- Integrity (VI): N
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: U