BOOK THIS SPACE FOR AD
ARTICLE ADHello , I am Muneeb and this write up shows a step by step POC on how you can find easily a P3 vulnerability in any VDP or BB program.
Vulnerability Description:
A mobile application apk containing a sensitive URL but not securely handled. During the testing it was discovered that a known mobile application contains a URL to it’s Firebase database upon accessing the URL it was accessed without any authentication . Please see the below step by step POC showing how you can test any apk for this vulnerability.
https://<nameOFMobile>-application.firebaseio.com/.json
6. Now you have accessed the firebase without any authentication. See the below attached image.
Conclusion:
1. Always look for firebase URL while testing APK’s. You may discover an unauthenticated Firebase.
2. You can also use MobSF tool for automated scan over APKs but I prefer manual testing.
3. Unfortunately this was a duplicate.
If you find this write up useful considering giving it a clap. Follow me for more easy to understand write ups.
Thank you for reading.
Connect with me on LinkedIn:
https://www.linkedin.com/in/muneeb-alam-khan-4a6a60152/