Yizhe Shi (Fudan University), Zhemin Yang (Fudan University), Dingyi Liu (Fudan University), Kangwei Zhong (Fudan University), Jiarun Dai (Fudan University), Min Yang (Fudan University)

In the app-in-app ecosystem, super-apps provide mini-app developers access to various sensitive cloud services, such as cloud database and cloud storage. These services enable mini-app developers to efficiently store and manage mini-app data in the super-app server. To protect these sensitive resources, super-apps implement an identity management mechanism, allowing mini-app developers to verify user identity and ensure that only authorized and trusted users can access specific resources. However, flaws exist in the implementation of resource management by mini-app developers, which can expose sensitive resources to attackers.

In this paper, we conduct the first systematic study of the insecure cloud resource management in the app-in-app ecosystem. We design and implement a tool, ICREMiner, that combines static analysis and dynamic probing to assess the security implications on 22,695 real-world mini-apps that access app-in-app cloud services in four super-app platforms. The results of our study reveal that 2,815 mini-apps (12.40%) are affected by the insecure resource management, involving 8,062 insecure cloud operations. We have identified that some mini-apps of prominent corporations are also vulnerable to these risks. Additionally, we conduct an in-depth analysis of the significant security hazards that can be caused by the vulnerability, such as allowing attackers to steal sensitive user information and pay for free. In response, we have engaged in responsible vulnerability disclosure to the super-app platforms and corresponding mini-app developers. We also provide several mitigation strategies to help them resolve the vulnerabilities.

View More Papers

Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic...

Ye Wang (Department of Electrical Engineering and Computer Science, Institute for Information Sciences, The University of Kansas), Bo Luo (Department of Electrical Engineering and Computer Science, Institute for Information Sciences, The University of Kansas), Fengjun Li (Department of Electrical Engineering and Computer Science, Institute for Information Sciences, The University of Kansas)

Read More

PhishLang: A Real-Time, Fully Client-Side Phishing Detection Framework Using...

Sayak Saha Roy (The University of Texas at Arlington), Shirin Nilizadeh (The University of Texas at Arlington)

Read More

SoK: Take a Deep Step into Linux Kernel Hardening...

Yinhao Hu (Huazhong University of Science and Technology & Zhongguancun Laboratory), Pengyu Ding (Huazhong University of Science and Technology & Zhongguancun Laboratory), Zhenpeng Lin (Independent Researcher), Dongliang Mu (Huazhong University of Science and Technology), Yuan Li (Zhongguancun Laboratory)

Read More