Skip to content

Commit 16aed18

Browse files
Address reviews - Elaborate on docs and update severity
1 parent f4b6a85 commit 16aed18

File tree

3 files changed

+5
-4
lines changed

3 files changed

+5
-4
lines changed

java/ql/lib/semmle/code/java/security/AndroidLocalAuthQuery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ class AuthenticationSuccessCallback extends Method {
2121
this.hasName("onAuthenticationSucceeded")
2222
}
2323

24-
/** Gets the parameter containing the `authenticationResult` */
24+
/** Gets the parameter containing the `authenticationResult`. */
2525
Parameter getResultParameter() { result = this.getParameter(0) }
2626

2727
/** Gets a use of the result parameter that's used in a `super` call to the base `AuthenticationCallback` class. */

java/ql/src/Security/CWE/CWE-287/AndroidInsecureLocalAuthentication.qhelp

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
<overview>
77
<p>
88
Biometric local authentication such as fingerprint recognition can be used to protect sensitive data or actions within an application.
9-
However, if this authentication does not make use of a <code>KeyStore</code>-backed key, it is able to be bypassed by a privileged malicious application or an attacker with physical access.
9+
However, if this authentication does not make use of a <code>KeyStore</code>-backed key, it is able to be bypassed by a privileged malicious application or an attacker with physical access,
10+
using application hooking tools such as Frida.
1011
</p>
1112
</overview>
1213

@@ -20,7 +21,7 @@ in a way that is required for the sensitive parts of the application to function
2021
<example>
2122
<p>In the following (bad) case, no <code>CryptoObject</code> is required for the biometric prompt to grant access, so it can be bypassed.</p>
2223
<sample src="AndroidInsecureLocalAuthenticationBad.java" />
23-
<p>In he following (good) case, a secret key is generated in the Android <code>KeyStore</code> that is required for the application to grant access.</p>
24+
<p>In the following (good) case, a secret key is generated in the Android <code>KeyStore</code> that is required for the application to grant access by decrypting data.</p>
2425
<sample src="AndroidInsecureLocalAuthenticationGood.java" />
2526
</example>
2627

java/ql/src/Security/CWE/CWE-287/AndroidInsecureLocalAuthentication.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Local authentication that does not make use of a `CryptoObject` can be bypassed.
44
* @kind problem
55
* @problem.severity warning
6-
* @security-severity 9.3
6+
* @security-severity 4.4
77
* @precision high
88
* @id java/android/insecure-local-authentication
99
* @tags security

0 commit comments

Comments
 (0)