Security Market Segment LS
Sunday, 06 December 2020 08:43

Many Android apps yet to patch flaw in Google Play Core Library Featured

Many Android apps yet to patch flaw in Google Play Core Library Image by Teri Comroe from Pixabay

A client-side vulnerability in the Google Play Core Library, patched by the company in April, is still present in many Android apps because developers are yet to include the patch into these apps.

The security firm Check Point said it had begun monitoring vulnerable applications since the patch was released.

Explaining the functions of the library, Check Point researchers Aviran Hazum and Jonathan Shimonovich wrote: "The Play Core Library is your app’s runtime interface with the Google Play Store. Some of the things you can do with Play Core include: download additional language resources; manage delivery of feature modules; manage delivery of asset packs; trigger in-app updates; and request in-app reviews."

They said the vulnerability could be briefly described this way: "Inside the sandbox of each application, there are two folders: one for 'verified' files received from Google Play, and another for 'non-verified' files. Files downloaded from Google Play services go into the verified folder, while files downloaded from other sources are sent to the non-verified folder. When a file is written to the verified folder, it interacts with the Google Play Core library which loads and executes it.

"Another feature, an exported intent, allows other sources to push files into the hosting application’s sandbox. There are some limitations: the file is pushed into the non-verified folder, and it is not automatically handled by the library.

"The vulnerability lies within the combination of the two features mentioned above, and also uses file traversal, a concept as old as the Internet itself. When a third-party source pushes a file into another application, it needs to supply a path for the file to be written to. If an attacker uses file traversal (../verified_splits/my_evil_payload.apk), the payload is written to the verified folder, and is automatically loaded into the vulnerable application and executed within its scope."

Some of the better-known apps that use this library are Google Chrome, Facebook, Instagram, WhatsApp, SnapChat, Booking and Edge.

The researchers said if a malicious application was able to exploit the vulnerability, then it would be able to run code inside many popular apps with the same permissions as the app itself.

"The possibilities are limited only by our creativity," Hazum and Shimonovich said, citing the following examples:

  • Injection of code into banking applications to grab credentials, and at the same time have SMS permissions to steal the two-factor authentication codes.
  • Injection code into business applications to gain access to corporate resources.
  • Injection of code into social media applications to spy on the victim, and use location access to track the device.
  • Injection of code into instant messaging apps to grab all messages, and possibly send messages on the victim’s behalf.

In September, 13% of the Google Play applications analysed used the library, with 8% having a vulnerable version, the duo found.

The following apps were found to have a vulnerable version of the library: Viber, Booking (both now patched), Cisco Teams (patched on 3 December), Yango Pro (Taximeter), Moovit (patched on 3 December), Grindr (patched on 3 December), OKCupid, Microsoft Edge, Xrecorder and PowerDirector.

"As our demo video [above] shows, this vulnerability is easy to exploit," Hazum and Shimonovich said. "All you need to do is to create a 'hello world' application that calls the exported intent in the vulnerable app to push a file into the verified files folder with the file-traversal path.

"Then sit back and watch the magic happen. To demonstrate targeting a specific application, we took a vulnerable version of the Google Chrome application and created a dedicated payload to grab its bookmarks."

Subscribe to ITWIRE UPDATE Newsletter here


The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News