Optimize the document of Quark Script CWE-319, 327, and 328 #59
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Detect CWE-319 in Android Application
This scenario seeks to find Cleartext Transmission of Sensitive Information in the APK file.
CWE-319 Cleartext Transmission of Sensitive Information
We analyze the definition of CWE-319 and identify its characteristics.
See CWE-319 for more details.
Code of CWE-319 in ovaa.apk
We use the ovaa.apk sample to explain the vulnerability code of CWE-319.
CWE-319 Detection Process Using Quark Script API
Let’s use the above APIs to show how the Quark script finds this vulnerability. This sample uses the package
Retrofitto request Web APIs, but the APIs use cleartext protocols.We first design a detection rule
setRetrofitBaseUrl.jsonto spot on behavior that sets the base URL of the Retrofit instance. Then, we loop through a custom list of cleartext protocol schemes and use APIbehaviorInstance.hasString(pattern, isRegex)to filter if there are arguments that are URL strings with cleartext protocol.If the answer is YES, CWE-319 vulnerability is caused.
Quark Script: CWE-319.py
Quark Rule: setRetrofitBaseUrl.json
{ "crime": "Set Retrofit Base Url", "permission": [], "api": [ { "descriptor": "()V", "class": "Lretrofit2/Retrofit$Builder;", "method": "<init>" }, { "descriptor": "(Ljava/lang/String;)Lretrofit2/Retrofit$Builder;", "class": "Lretrofit2/Retrofit$Builder;", "method": "baseUrl" } ], "score": 1, "label": [] }Quark Script Result
Detect CWE-327 in Android Application
This scenario seeks to find Use of a Broken or Risky Cryptographic Algorithm in the APK file.
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
We analyze the definition of CWE-327 and identify its characteristics.
See CWE-327 for more details.
Code of CWE-327 in InjuredAndroid.apk
We use the InjuredAndroid.apk sample to explain the vulnerability code of CWE-327.
CWE-327 Detection Process Using Quark Script API
Let’s use the above APIs to show how the Quark script finds this vulnerability.
We first design a detection rule
useOfCryptographicAlgo.jsonto spot on behavior using cryptographic algorithms. Then, we use APIbehaviorInstance.hasString(pattern, isRegex)with a list to check if the algorithm is risky. If YES, that may cause the exposure of sensitive data.Quark Script CWE-327.py
Quark Rule: useOfCryptographicAlgo.json
{ "crime": "Use of cryptographic algorithm", "permission": [], "api": [ { "class": "Ljavax/crypto/Cipher;", "method": "getInstance", "descriptor": "(Ljava/lang/String;)Ljavax/crypto/Cipher" }, { "class": "Ljavax/crypto/Cipher;", "method": "init", "descriptor": "(I Ljava/security/Key;)V" } ], "score": 1, "label": [] }Quark Script Result
Detect CWE-328 in Android Application
This scenario seeks to find the Use of Weak Hash.
CWE-328 Use of Weak Hash
We analyze the definition of CWE-328 and identify its characteristics.
See CWE-328 for more details.
Code of CWE-328 in allsafe.apk
We use the allsafe.apk sample to explain the vulnerability code of CWE-328.
CWE-328 Detection Process Using Quark Script API
Let's use the above APIs to show how the Quark script finds this vulnerability.
First, we use API
findMethodInAPK(samplePath, targetMethod)to find the methodMessageDigest.getInstance()orSecretKeyFactory.getInstance(). Next, we use APImethodInstance.getArguments()with a list to check if the method uses weak hashing algorithms. If YES, that causes CWE-328 vulnerability.Quark Script: CWE-328.py
Quark Script Result