Home / Vulnerability Database / Kotlin : Arbitrary code execution
Kotlin

Kotlin : Arbitrary code execution

Classification

OWASP Top 10 2013
OWASP Top 10 2017
CWE/SANS Top 25 2011

Overview

Developers are able to add extra functionality into Android apps by using external modules (native libraries, third-party app files, etc.). Such modules are executed in the context of the main app, which leads to Arbitrary code execution. Software and Data Integrity Failures take eighth place in the OWASP Top 10 2021 list of ten most significant vulnerabilities in web applications.

After installing the module the main app searches for it among all the apps installed on the same device by using values from manifest file AndroidManifest.xml. If the verification is not strong enough, an attacker’s app may be treated as a legitimate module and its code can be executed in the context of the main app – leading to arbitrary code execution. As a result, the attacker may steal any sensitive data from the app, as well as to substitute this data, disclose financial details, and track the user.

MEDIUM

DerScanner Severity Score

Do you want to fix Kotlin : Arbitrary code execution in your application?

See also

Kotlin

Kotlin : Missing required cryptographic step

Kotlin

Kotlin : Logging into system output

Kotlin

Kotlin : Call of notify() in synchronized block