← Back
Flag16 - Insecure Providers | Avishai’s CTF Writeups

Avishai's CTF Writeups

Yalla Balagan! A collection of my CTF writeups and solutions.

View on GitHub

Let’s first have a look at the challenge:

400 When looking at AndroidManifest.xml, we can see there is an exported content provider named DataProvider:

When getting down into the source code, we can see that if it gets request of query, it simply sends it to the sqlite helper:

Let’s send query request to this host:

adb shell content query --uri content://infosecadventures.allsafe.dataprovider

I got the full table, because when projection is null, it interprets it as *.

We could have the same result, using the next line:

adb shell content query --uri content://infosecadventures.allsafe.dataprovider --projection '"*"'

Anyway, because this is exported, and also the query is misconfigured, we can get the whole db.