• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
amazon quietly patches 'high severity' vulnerability in android photos app

Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App

You are here: Home / General Cyber Security News / Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App
July 1, 2022

Amazon, in December 2021, patched a substantial severity vulnerability influencing its Pictures application for Android that could have been exploited to steal a user’s obtain tokens.

“The Amazon entry token is applied to authenticate the user across numerous Amazon APIs, some of which contain private knowledge such as total title, email, and deal with,” Checkmarx researchers João Morais and Pedro Umbelino stated. “Many others, like the Amazon Drive API, allow an attacker entire access to the user’s data files.”

The Israeli software security screening organization claimed the issue to Amazon on November 7, 2021, following which the tech big rolled out a resolve on December 18, 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The leak is the result of a misconfiguration in one particular of the app’s components named “com.amazon.gallery.thor.application.exercise.ThorViewActivity” that’s described in the AndroidManifest.xml file and which, when released, initiates an HTTP ask for with a header containing the accessibility token.

Amazon Photo App vulnerability

In a nutshell, it indicates that an exterior application could send an intent — a message to aid communication concerning applications — to launch the vulnerable action in dilemma and redirect the HTTP ask for to an attacker-controlled server and extract the entry token.

CyberSecurity

Calling the bug a case of broken authentication, the cybersecurity organization reported the issue could have enabled malicious applications installed on the gadget to grab the accessibility tokens, granting the attacker permissions to make use of the APIs for abide by-on functions.

This could differ from deleting information and folders in Amazon Push to even exploiting the access to stage a ransomware attack by studying, encrypting, and re-creating a victim’s information when erasing their record.

Checkmarx further observed that the vulnerability may possibly have experienced a broader impact provided that the APIs exploited as element of its evidence-of-notion (PoC) constitute only a compact subset of the overall Amazon ecosystem.

Observed this write-up attention-grabbing? Adhere to THN on Facebook, Twitter  and LinkedIn to study a lot more unique written content we submit.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «northern ireland is the future of british cyber security Northern Ireland is the future of British cyber security
Next Post: Santander Warns of 87% Surge in Celeb Crypto Scams Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.