MASWE-0062: Insecure Services
Content in BETA
This content is in beta and still under active development, so it is subject to change any time (e.g. structure, IDs, content, URLs, etc.).
Draft Weakness
This weakness hasn't been created yet and it's in draft. But you can check its status or start working on it yourself. If the issue has not yet been assigned, you can request to be assigned to it and submit a PR with the new content for that weakness by following our guidelines.
Check our GitHub Issues for MASWE-0062
Initial Description or Hints¶
Unintentionally exported services, unrestricted permissions. Exposed binders e.g not using checkCallingPermission() to verify whether the caller has a required permission.
Relevant Topics¶
- Services
- Exposed Binders via Exported Services
References¶
- https://developer.android.com/privacy-and-security/security-tips#Services
- https://developer.android.com/guide/topics/manifest/service-element
- https://developer.android.com/reference/android/app/Service
- https://developer.android.com/privacy-and-security/security-tips#binder-and-messenger-interfaces
MASTG v1 Coverage¶
- MASTG-TEST-0072 - Testing App Extensions (ios)
- MASTG-TEST-0071 - Testing UIActivity Sharing (ios)
- MASTG-TEST-0073 - Testing UIPasteboard (ios)
- MASTG-TEST-0070 - Testing Universal Links (ios)
- MASTG-TEST-0030 - Testing for Vulnerable Implementation of PendingIntent (android)
- MASTG-TEST-0029 - Testing for Sensitive Functionality Exposure Through IPC (android)