Top Qs
Timeline
Chat
Perspective
XARA
From Wikipedia, the free encyclopedia
Remove ads
XARA (Cross-App Resource Access) is a class of vulnerabilities that allows malicious applications to gain unauthorized access to resources belonging to other applications running on the same operating system. First extensively documented in 2015 by researchers at Indiana University, Georgia Tech, and Peking University, XARA vulnerabilities represent significant security threats to modern sandboxed computing environments, particularly on macOS, iOS; similar inter-app vulnerabilities have also been identified on Android.
XARA attacks exploit weaknesses in inter-process communication mechanisms and access control policies, enabling attackers to bypass the principle of least privilege in sandboxed applications. Examples include unauthorized access to keychain items, URL scheme hijacking, WebSocket hijacking, and app container cracking. These vulnerabilities can lead to theft of authentication credentials and personal data without requiring privilege escalation or jailbreaking.
The 2015 XARA disclosure prompted security enhancements in major operating systems, such as stricter sandbox controls on macOS and iOS. However, new variants continue to emerge as application ecosystems become more complex and interconnected.
Remove ads
Initial Disclosure
An academic research paper entitled "Unauthorized Cross-App Resource Access on MAC OS X and iOS".[1] was published on 26 May 2015 by a team of researchers from Indiana University, Tsinghua University, Peking University, Chinese Academy of Sciences, and Georgia Institute of Technology. The paper was widely released to the public on 16 June 2015[2] and commented on by both mainstream and technical media outlets.[3][4][5][6][7]
The paper identifies a number of separate categories of zero day threats to applications and stored passwords which can potentially be exploited by malware on iOS devices and OS X. The paper also discloses the existence of similar vulnerabilities on Android devices.
Remove ads
Response by Vendors
- On 19 June 2015, Apple Computer responded to the press[8] that they had implemented countermeasures to exclude malware containing the XARA exploit from their iOS App Store.
Attack Vectors
In XARA each attack vector violates the principles of a computer security sandbox.
- Untrusted partners using shared resources such file system, keychain.
- Inter-process communication without verification of partner.
- Weak security policies of system installer allow other applications to be designated as shared resource bundles.
Known systems with problems
- iOS from Apple Computer
- OS X from Apple Computer
- Android from Google
See also
References
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads