MASWE-0065: Sensitive Data Permanently Shared with Other Apps
Content in BETA
This content is in beta and still under active development, so it is subject to change any time (e.g. structure, IDs, content, URLs, etc.).
Draft Weakness
This weakness hasn't been created yet and it's in draft. But you can check its status or start working on it yourself. If the issue has not yet been assigned, you can request to be assigned to it and submit a PR with the new content for that weakness by following our guidelines.
Check our GitHub Issues for MASWE-0065
Initial Description or Hints¶
Provide clients one-time access to data. For example using URI permission grant flags and content provider permissions to display an app's PDF file in a separate PDF Viewer app.
Relevant Topics¶
- content providers
- FLAG_GRANT_READ_URI_PERMISSION
- FLAG_GRANT_WRITE_URI_PERMISSION
- FLAG_GRANT_PERSISTABLE
- content URIs
- file URIs
References¶
- https://developer.android.com/topic/security/risks/content-resolver
- https://developer.android.com/reference/androidx/core/content/FileProvider
- https://developer.android.com/topic/security/risks/file-providers
- https://developer.android.com/privacy-and-security/security-tips#ContentProviders