Jump to content

XARA

From Wikipedia, the free encyclopedia

XARA (Cross-App Resource Access) is a class of vulnerabilities that allows malicious applications to gain unauthorized access to resources belonging to other applications running on the same operating system. First extensively documented in 2015 by researchers at Indiana University, Georgia Tech, and Peking University, XARA vulnerabilities represent significant security threats to modern sandboxed computing environments, particularly on macOS, iOS; similar inter-app vulnerabilities have also been identified on Android.

XARA attacks exploit weaknesses in inter-process communication mechanisms and access control policies, enabling attackers to bypass the principle of least privilege in sandboxed applications. Examples include unauthorized access to keychain items, URL scheme hijacking, WebSocket hijacking, and app container cracking. These vulnerabilities can lead to theft of authentication credentials and personal data without requiring privilege escalation or jailbreaking.

The 2015 XARA disclosure prompted security enhancements in major operating systems, such as stricter sandbox controls on macOS and iOS. However, new variants continue to emerge as application ecosystems become more complex and interconnected.

Initial Disclosure

[edit]

An academic research paper entitled "Unauthorized Cross-App Resource Access on MAC OS X and iOS".[1] was published on 26 May 2015 by a team of researchers from Indiana University, Tsinghua University, Peking University, Chinese Academy of Sciences, and Georgia Institute of Technology. The paper was widely released to the public on 16 June 2015[2] and commented on by both mainstream and technical media outlets.[3][4][5][6][7]

The paper identifies a number of separate categories of zero day threats to applications and stored passwords which can potentially be exploited by malware on iOS devices and OS X. The paper also discloses the existence of similar vulnerabilities on Android devices.

Response by Vendors

[edit]
  1. On 19 June 2015, Apple Computer responded to the press[8] that they had implemented countermeasures to exclude malware containing the XARA exploit from their iOS App Store.

Attack Vectors

[edit]

In XARA each attack vector violates the principles of a computer security sandbox.

  1. Untrusted partners using shared resources such file system, keychain.
  2. Inter-process communication without verification of partner.
  3. Weak security policies of system installer allow other applications to be designated as shared resource bundles.

Known systems with problems

[edit]
  1. iOS from Apple Computer
  2. OS X from Apple Computer
  3. Android from Google

See also

[edit]

References

[edit]
  1. ^ Xing, Luyi; Bai, Xiaolong; Li, Tongxin; Wang, XiaoFeng; Chen, Kai; Liao, Xiaojing; Hu, Shi-Min; Han, Xinhui (26 May 2015). "Unauthorized Cross-App Resource Access on MAC OS X and iOS". arXiv:1505.06836 [cs.CR].
  2. ^ "Unauthorized Cross-App Resource Access on MAC OS X and iOS". 16 June 2015. Retrieved 18 June 2015.
  3. ^ "Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X". TheRegister. Retrieved 20 June 2015.
  4. ^ "OS X and iOS Unauthorized Cross Application Resource Access (XARA)". InfoSec Handlers Diary Blog. Sans Technology Institute.
  5. ^ "iOS and OS X Security Flaws Enable Malicious Apps to Steal Passwords and Other Data". MacRumors. 17 June 2015. Retrieved 20 June 2015.
  6. ^ "Zero-Day Exploits for Stealing OS X and iOS Passwords". The Hacker News. Retrieved 20 June 2015.
  7. ^ "Zero-day exploit lets App Store malware steal OS X and iOS passwords". MacWorld. Retrieved 20 June 2015.
  8. ^ "Apple comments on XARA exploits, and what you need to know". iMore. imore.com. 19 June 2015.