Path traversal security vulnerability

I got this info from Google:

What’s happening
Starting January 16th, 2018, Google Play will block publishing of any new apps or updates that contain this path traversal vulnerability. Your published APK version will remain unaffected, but any updates to the app will be blocked if the vulnerability is present.

Action required
There are two recommended strategies for eliminating a path traversal vulnerability in a ContentProvider.

  • If your ContentProvider does not need to be exposed to other apps:

  • If your ContentProvider needs to be exposed to other apps:

Implementations ofopenFilein exported ContentProviders can be vulnerable if they don’t properly validate incoming Uri parameters. A malicious app can supply a crafted Uri (for example, one that contains “/…/”) to trick your app into returning a ParcelFileDescriptor for a file outside of the intended directory, which allows the malicious app to access any file accessible to your app.

Next steps

  1. Update your app using the steps highlighted above.
  2. Sign in to your Play Consoleand submit the updated version of your app.
  3. Check back after five hours. We’ll show a warning message if the app hasn’t been updated correctly.

Any idea where to look into this and what is to do to avoid this?

Right now I have no clue where to look at.

Thank you!

Dani

I just got the same info for all of our Corona built apps on Google Play Store.

Me to - from reading the email looks like we have a couple of months for Corona to fix the issue before uploading new versions will be blocked.   I’m guessing there’ll be a slew of responses to this thread over the next couple of days.

I can confirm that I have had the exact same email from Google regarding my Corona built app. 

same thing 

Same here - got exactly the same email.

Same here. All my apps made with Corona.

Same here, solutions suggested by Google are:

  1. ​Remove possibility of other apps accessing your app’s files (setting exported =“false”)
  2. Allow access only to apps with your signature (basically only to your other apps) - protectionLevel =“signature”
  3. Rewrite content provider to make it secure against crafted Uris. As it is implemented by Corona, we will have to wait

Same mail i got it too… Can any corona labs person can guide us what to do ahead???

ditto - across the board, all apps

perhaps io.open() re storing persistent settings?

Hey, guys,

There is another thread about this issue. We are aware of it and working on a fix. Follow it to get updates.

https://forums.coronalabs.com/topic/70306-path-traversal-security-vulnerability-on-google-play/

I just got the same info for all of our Corona built apps on Google Play Store.

Me to - from reading the email looks like we have a couple of months for Corona to fix the issue before uploading new versions will be blocked.   I’m guessing there’ll be a slew of responses to this thread over the next couple of days.

I can confirm that I have had the exact same email from Google regarding my Corona built app. 

same thing 

Same here - got exactly the same email.

Same here. All my apps made with Corona.

Same here, solutions suggested by Google are:

  1. ​Remove possibility of other apps accessing your app’s files (setting exported =“false”)
  2. Allow access only to apps with your signature (basically only to your other apps) - protectionLevel =“signature”
  3. Rewrite content provider to make it secure against crafted Uris. As it is implemented by Corona, we will have to wait

Same mail i got it too… Can any corona labs person can guide us what to do ahead???

ditto - across the board, all apps

perhaps io.open() re storing persistent settings?