-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
27 additions
and
10 deletions.
There are no files selected for viewing
4 changes: 0 additions & 4 deletions
4
MOBILE_CLIENT/COMMON/_HIGH/OVERLAY_VULNERABILITY/description.md
This file was deleted.
Oops, something went wrong.
4 changes: 0 additions & 4 deletions
4
MOBILE_CLIENT/COMMON/_HIGH/OVERLAY_VULNERABILITY/recommendation.md
This file was deleted.
Oops, something went wrong.
4 changes: 4 additions & 0 deletions
4
MOBILE_CLIENT/COMMON/_HIGH/TAPJACKING_VULNERABILITY/description.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
|
||
# Tapjacking Vulnerability | ||
|
||
The Tapjacking Vulnerability is a security flaw that allows an attacker to overlay malicious content or interfaces on top of legitimate applications, tricking users into interacting with the attacker's content instead. This can lead to various malicious activities, such as stealing sensitive information, capturing login credentials, or performing unauthorized actions on the user's behalf. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
16 changes: 16 additions & 0 deletions
16
MOBILE_CLIENT/COMMON/_HIGH/TAPJACKING_VULNERABILITY/recommendation.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
|
||
# Overlay Vulnerability | ||
|
||
To mitigate Tapjacking vulnerabilities in mobile applications, developers should: | ||
|
||
* Implement robust security measures for mobile applications to mitigate overlay vulnerabilities. | ||
* Focus on enhancing settings and user interactions for increased security. | ||
* Thoroughly validate and filter user inputs and application settings to prevent exploitation by malicious overlays. | ||
* Pay special attention to sensitive settings vulnerable to manipulation by overlays, such as authentication parameters or access controls. | ||
* Implement strict input validation checks on user-modifiable settings to prevent unauthorized changes. | ||
* For settings related to user authentication or authorization, enforce strong authentication mechanisms and authorization controls. | ||
* Provide clear user guidance within the application on recognizing and avoiding suspicious overlays. | ||
* Regularly update the application to address newly identified vulnerabilities. | ||
* Consider implementing overlay detection mechanisms to enhance the application's resilience against potential threats. | ||
* On Android 6 (API level 23) and higher, users have to explicitly grant the permission for the app to create an overlay window. | ||
* On Android 12 (API level 31) and higher, apps can pass true into Window.setHideOverlayWindows(). |