Skip to content

MASTG v1->v2 MASTG-TEST-0026: Testing Implicit Intents (android) #2997

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
cpholguera opened this issue Nov 2, 2024 · 7 comments · May be fixed by #3271
Open

MASTG v1->v2 MASTG-TEST-0026: Testing Implicit Intents (android) #2997

cpholguera opened this issue Nov 2, 2024 · 7 comments · May be fixed by #3271

Comments

@cpholguera
Copy link
Collaborator

Create a new MASTG v2 test covering for":

Follow the guidelines

@TheDauntless
Copy link
Collaborator

This test currently contains mostly 'testing for injection' stuff, which could be moved to #2999, though it would have to be refactored.

There are specific issues with implicit intents, for example using them to trigger internal components, which is what this test should cover.

@ScreaMy7
Copy link
Collaborator

@cpholguera Please assign this to me.

@cpholguera
Copy link
Collaborator Author

Thanks @ScreaMy7 , it's yours now. Please consider the above comment from @TheDauntless . If you want I can also assign you #2999 so that you can tackle both at the same time and try to properly separate concerns. What do you think?

@ScreaMy7
Copy link
Collaborator

Thanks for assigning this @cpholguera. We will take testing injection flaw next.

@ScreaMy7
Copy link
Collaborator

ScreaMy7 commented Apr 9, 2025

@cpholguera Should the demo be using static analysis (using semgrep) or dynamic analysis (using ADB) for this test case of triggering internal components from implicit intents?

@cpholguera
Copy link
Collaborator Author

You can do a static demo (semgrep) and a dynamic one (frida).

You may also need an attacker, as I did in this PR: https://github.com/OWASP/owasp-mastg/pull/3177/files#diff-7cf9a476904f94bca9185237fd004add0b6a0c20e3ead78ce2813612069c0a22

In my case the "attacker" is a server in python. In your case, it could be a script using adb, a MastgTestAttacker.kt, or whatever you see fit.

This would be the first time we use such a MASTG-DEMO-xxxx/MastgTestAttacker.kt, but don't worry, I will take care of the pipelines so that it is built correctly. I can make them generate MASTG-DEMO-xxxx.apk and MASTG-DEMO-xxxx-Attacker.apk if necessary.

@ScreaMy7
Copy link
Collaborator

The Demo for the dynamic testcase is completed. The Static demo using semgrep, should we use the semgrep pattern on the reversed_AndroidManifest or the MastgTest_reversed.java?
@cpholguera

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment