Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Overlay Vulnerability #99

Merged
merged 7 commits into from
Dec 28, 2023
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

# Overlay Vulnerability

The Overlay Vulnerability is a security flaw that allows an attacker to overlay malicious content or interfaces on top of legitimate applications, tricking users into interacting with the attacker's content instead. This can lead to various malicious activities, such as stealing sensitive information, capturing login credentials, or performing unauthorized actions on the user's behalf.
19 changes: 19 additions & 0 deletions MOBILE_CLIENT/COMMON/_HIGH/OVERLAY_VULNERABILITY/meta.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{
"risk_rating": "high",
"short_description": "Overlay Vulnerability is a type of vulnerability where an attacker can overlay malicious content on top of legitimate content, leading to potential security breaches.",
"references": {
"Overlay Attacks: Top Techniques And How To Counter Them": "https://www.appsealing.com/overlay-attacks/",
"Mobile overlay attacks on Android": "https://www.ikarussecurity.com/en/mobile-device-management-en/mobile-overlay-attacks-on-android/"
},
"title": "Overlay Vulnerability",
ErebusZ marked this conversation as resolved.
Show resolved Hide resolved
"privacy_issue": false,
ErebusZ marked this conversation as resolved.
Show resolved Hide resolved
"security_issue": true,
"categories": {
"OWASP_MASVS_L1": [
"MSTG_PLATFORM_2"
],
"OWASP_MASVS_L2": [
"MSTG_PLATFORM_2"
]
ErebusZ marked this conversation as resolved.
Show resolved Hide resolved
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

# Overlay Vulnerability

To mitigate overlay vulnerabilities in mobile applications, developers should implement robust security measures with a focus on enhancing settings and user interactions. First and foremost, ensure that user inputs and application settings undergo thorough validation and filtering to prevent potential exploitation by malicious overlays. Pay special attention to sensitive settings that can be manipulated by overlays, such as authentication parameters or access controls. Implement strict input validation checks on user-modifiable settings to prevent unauthorized changes. When handling settings related to user authentication or authorization, enforce strong authentication mechanisms and authorization controls to minimize the impact of potential overlay attacks. Provide clear user guidance within the application on recognizing and avoiding suspicious overlays. Regularly update the application to address any newly identified vulnerabilities, and consider implementing overlay detection mechanisms to enhance the application's resilience against potential threats.
ErebusZ marked this conversation as resolved.
Show resolved Hide resolved
Loading