CWE-925: Improper Verification of Intent by Broadcast Receiver
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The Android application uses a Broadcast Receiver that receives an Intent but does not properly verify that the Intent came from an authorized source.
扩展描述
Certain types of Intents, identified by action string, can only be broadcast by the operating system itself, not by third-party applications. However, when an application registers to receive these implicit system intents, it is also registered to receive any explicit intents. While a malicious application cannot send an implicit system intent, it can send an explicit intent to the target application, which may assume that any received intent is a valid implicit system intent and not an explicit intent from another application. This may lead to unintended behavior.
常见后果
影响范围: Integrity
技术影响: Gain Privileges or Assume Identity
说明: Another application can impersonate the operating system and cause the software to perform an unintended action.
潜在缓解措施
阶段: Architecture and Design
描述: Before acting on the Intent, check the Intent Action to make sure it matches the expected System action.
检测方法
方法: Automated Static Analysis
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
有效性: High
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | - |