exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Evernote Android Multiple PIN Related Issues

Evernote Android Multiple PIN Related Issues
Posted Dec 13, 2013
Authored by Chris John Riley

Evernote for Android suffers from insecure storage of PIN data and bypass of PIN protection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2013-5112
SHA-256 | d4ec90670f420f077afc1f1d13f17cf6aed8381fff2d28c4df4a6c42bd1b8f2a

Evernote Android Multiple PIN Related Issues

Change Mirror Download
Evernote Android Insecure Storage of PIN data / Bypass of PIN protection

Product: Evernote (Android)
Project Homepage: evernote.com
Internal Advisory ID: c22-2013-03 / c22-2013-04
Vulnerable Version(s): Android version 5.5.0 (and prior)
Tested Version: Android 5.x (Android 4.2/4.3)
Vendor Notification: Aug 13, 2013
Public Disclosure: December 07, 2013
Vulnerability Type: Authentication Bypass Issues [CWE-592]
CVE Reference: CVE-2013-5112
Issue Severity: Important impact
CVSSv2 Base Score: 6.6 (AV:L/AC:L/AU:N/C:C/I:C/A:N)
Discovery: Chris John Riley ( http://blog.c22.cc )

Advisory Details:

Effected versions of Evernote on the Android platform allow
for users with limited access via the ADB (Android Debug Bridge)
interface of an Android device (USB debugging enabled, no root access
required) to perform backup and restore of applications and application
data. The ADB backup functionality requires an Android device running
the Ice-Cream Sandwich version of Android (4.x) or above.
Evernote Premium on Android allows the user to set PIN protection on the
the Android container to prevent unauthorized access in the event the
device is lost or stolen. Due to the way recent versions of Android
implements the backup and restore process, the implemented PIN
protection can be avoided and entirely bypassed to allow attackers the
ability to clear or recover the PIN from application settings data
stored in com.evernote_preferences.xml.

Using a simple process, it is possible for an attacker with physical
access to a device to backup the Evernote Android container and either
recvoerd the PIN (encoded with a simele XOR encryption) or remove any
PIN protections present on the application container. The result of this
attack is the exposure of any data stored within the Evernote Android
container acquired by an attacker.

Impact:
Attackers can extract and possibly maintain access to a user's Evernote
data from a lost or stolen device.

Evernote have released a new version to the Google Play store that
corrects these issue by disabling the ability to perform an ADB backup
of the Evernote container. Additional changes have been made to the way
Evernote stores the PIN within the XML configuration file.
It has been confirmed that the version 5.5.1 is no longer directly
susceptible to this attack method.

References:
At this time Evernote have not provided an advisory discussing the issue
http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2
http://blog.c22.cc/2013/08/01/bsideslv-android-backup-unpacker-release

Vulnerability Timeline:

May, 2013 - Initial discovery of vulnerability
Aug 13, 2013 - Evernote contacted with request for secure communications
Aug 13, 2013 - Response from Evernote setting up secure communications
Aug 13, 2013 - Details reported to Evernote
Aug 15, 2013 - Response from Evernote confirming issues being examined
Aug 16, 2013 - CVE numbers sent to Evernote
Aug 27, 2013 - Name added to Evernote acknowledgements page
Nov 13, 2013 - Requested update from Evernote
Nov 15, 2013 - Response from Evernote - issues still being tracked
Nov 22, 2013 - Confirmation of fix for XOR PIN
Nov 25, 2013 - Asked for confirmation on other issues
Nov 25, 2013 - Confirmation that both issues had been address in 5.5.1
Dec 07, 2013 - Advisory released (delayed)
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close