Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

App secret exposed #565

Closed
ralesiupgrade opened this issue Mar 29, 2019 · 2 comments
Closed

App secret exposed #565

ralesiupgrade opened this issue Mar 29, 2019 · 2 comments
Labels

Comments

@ralesiupgrade
Copy link

Description

It was observed that app secret was harcoded in the android app which can be obtained by decompiling the android apk. Once apk is decompiled, navigate to assets directory and open the appcenter-config.json file to access the app secret.

Repro Steps

Run the following:apktool d 'target.apk'

Open the extracted folder and navigate to assets directory.

Open the appcenter-config.json file to access the app secret

Details

The App secret is like an api key for your app which can allow any attacker to invoke App Center REST APIs (like trigger builds or send push notifications). Is there any other form of authentication? Or if a attacker gotten access to the app secret would they have full access to all apis and carry out attacks?

@guperrot
Copy link
Member

guperrot commented Mar 29, 2019

Hi, no the App Secret cannot be used to call any AppCenter REST API (you need to generate a different API token for that). Though the name is confusing it can only be used to send telemetry to the ingestion endpoint (in.appcenter.ms) or to check for in-app updates.

This app identifier does not have permissions for push or build scope or anything else than ingestion/read in-app updates.

It is very common for analytics SDKs to have such a key that is scoped only to send telemetry as it is not possible to actually protect that.

@ralesiupgrade
Copy link
Author

@guperrot Thanks. closing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants