CWE-925: Improper Verification of Intent by Broadcast Receiver

Variant Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The Android application uses a Broadcast Receiver that receives an Intent but does not properly verify that the Intent came from an authorized source.

扩展描述

Certain types of Intents, identified by action string, can only be broadcast by the operating system itself, not by third-party applications. However, when an application registers to receive these implicit system intents, it is also registered to receive any explicit intents. While a malicious application cannot send an implicit system intent, it can send an explicit intent to the target application, which may assume that any received intent is a valid implicit system intent and not an explicit intent from another application. This may lead to unintended behavior.

常见后果

影响范围: Integrity

技术影响: Gain Privileges or Assume Identity

说明: Another application can impersonate the operating system and cause the software to perform an unintended action.

潜在缓解措施

阶段: Architecture and Design

描述: Before acting on the Intent, check the Intent Action to make sure it matches the expected System action.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

引入模式

阶段 说明
Architecture and Design -

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
Mobile (Undetermined)
关键信息

CWE ID: CWE-925

抽象级别: Variant

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-499