

Trend Micro claims that "an attacker may craft a fake file, then replace those files via the aforementioned vulnerability to perform code execution. This allows third-party apps to edit the data ShareIt uses to run, including the app cache generated during install and runtime. In effect, this vulnerability allows attackers to call on ShareIt's file-content provider and pass it a file path to get access to all of its data files. However, the developers behind ShareIt haven't given much thought to limit the app's content-provider capabilities, which can give attackers access to all files in ShareIt's "private" directory. It's up to developers to sanitize these cross-app capabilities and only expose the necessary file manager capabilities to Gmail and other apps." Screen Mirroring app is an easy screen casting application from phone to TV, supporting local sharing of videos, images, audio and documents online. If Gmail wants to attach a file to an email, it can do that by showing a list of available file-content providers installed on your phone (it's basically an "open with" dialog box), and the user can pick their favorite file manager, navigate through their storage, and pass the file they want to Gmail. The publication notes: "Android prides itself on intra-app communication, partly because any app can create a content provider and provide its content and services to other apps. Elaborating on one of the vulnerabilities, Ars Technica reveals that ShareIt has one common Android app vulnerability that can give attackers read/write access to all of its files.
