exploit the possibilities

Intel Crosswalk Project Man-In-The-Middle

Intel Crosswalk Project Man-In-The-Middle
Posted Jul 29, 2016
Site wwws.nightwatchcybersecurity.com

The Intel Crosswalk Project library for cross-platform mobile development did not properly handle SSL errors. This behavior could subject applications developed using this library to SSL MITM attacks.

tags | advisory
advisories | CVE-2016-5672
MD5 | 96bee80375033730cb0a1ef3f89f1521

Intel Crosswalk Project Man-In-The-Middle

Change Mirror Download
[Original at: https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue/]


The Intel Crosswalk Project library for cross-platform mobile
development did not properly handle SSL errors. This behaviour could
subject applications developed using this library to SSL MITM attacks.

Vulnerability Details

The Crosswalk Project, created by Intels Open Source Technology
Center, allows mobile developers to use HTML, CSS and Javascript to
develop and deploy mobile apps across multiple platforms from the same
codebase. The library packages the HTML assets provided by the
developer and runs them inside a WebView on the device. The library
also bridges some of the common APIs and services from the Javascript
code in the WebView to the underlying platform. The project supports
deployment to iOS, Windows Phone and Android. It is implemented in
multiple apps, some of which can be found here.

For the Android implementation of CrossWalk when an invalid or
self-signed SSL certificate is used during communication with the
server, the underlying library displays a prompt to the user asking
them to grant permission or deny permission to this certificate. If
the user allows the certificate, that choice is remembered going
forward and from that point in, all subsequent requests with invalid
SSL certificates are accepted by the application, and are not
rechecked. This applies even to connections over different WiFi
hotspots and different certificates. This may allow a network-level
attacker to mount MITM attack using invalid SSL certificate and
capture sensitive data.

Example of error dialog

The fix changes the behaviour to generate a programmatic error message
not visible to the user about an invalid SSL certificate. This issue
has been fixed in the following versions of Crosswalk and all users of
the library are encouraged to upgrade:

- 19.49.514.5 (stable)
- 20.50.533.11 (beta)
- 21.51.546.0 (beta)
- 22.51.549.0 (canary)

This issue was originally discovered while testing a third-party
Android app using this library.


CERT/CC vulnerability note:

Crosswalk security advisory:

CVE - CVE-2016-5672:

Intel blog post:


Thank you to CERT/CC for coordination on this issue, and to the Intel
Open Source Technology Center for the fix.


2016-05-25: Reported issue to the Intel PSIRT, got an automated reply
2016-05-30: Reached out to CERT/CC for help reaching Intel
2016-06-01: Request from CERT/CC for more details, provided details
via secure form
2016-06-15: Response from CERT/CC that Intel is planning a fix within 45 days
2016-06-23: Direct contact from Intel
2016-07-01: Asking CERT/CC to reserve a CVE, CERT/CC assigns a CVE
2016-07-22: Intel fix is finished and ready for testing
2016-07-25: We confirm the fix and coordinate disclosure dates
2016-07-29: Coordinated public disclosure


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By