16 vulnerabilities classified as CWE-927. AI Chinese analysis included.
CWE-927 represents a security weakness in Android development where applications transmit sensitive data using implicit intents rather than explicit ones. This vulnerability arises because implicit intents do not specify a target recipient, allowing the Android system to broadcast the data to any installed application that has registered an intent filter for that specific action. Attackers exploit this by installing malicious apps that listen for these broadcasts, thereby intercepting and accessing confidential information such as user credentials or personal details before the intended recipient processes it. To mitigate this risk, developers must strictly use explicit intents when communicating sensitive data, ensuring that the target component is explicitly defined. This approach restricts data transmission to trusted applications, preventing unauthorized interception by untrusted third-party software and maintaining the confidentiality and integrity of the communication channel.
Intent intent = new Intent(); intent.setAction("com.example.CreateUser"); intent.putExtra("Username", uname_string); intent.putExtra("Password", pw_string); sendBroadcast(intent);IntentFilter filter = new IntentFilter("com.example.CreateUser"); MyReceiver receiver = new MyReceiver(); registerReceiver(receiver, filter);Intent intent = new Intent(); intent.setAction("com.example.service.UserExists"); intent.putExtra("Username", uname_string); sendStickyBroadcast(intent);IntentFilter filter = new IntentFilter("com.example.service.UserExists"); MyReceiver receiver = new MyReceiver(); registerReceiver(receiver, filter);Vulnerabilities classified as CWE-927 represent 16 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.