

It works on various smartphone platforms allowing users to share files between devices directly. It allows users access to short format videos and a wide range of games making it a multimedia entertainment app for users. Trend Micro claims that "an attacker may craft a fake file, then replace those files via the aforementioned vulnerability to perform code execution. SHAREit is a peer-to-peer file sharing, content streaming and gaming platform that supports online and offline sharing of files and contents. This allows third-party apps to edit the data ShareIt uses to run, including the app cache generated during install and runtime. In effect, this vulnerability allows attackers to call on ShareIt's file-content provider and pass it a file path to get access to all of its data files. However, the developers behind ShareIt haven't given much thought to limit the app's content-provider capabilities, which can give attackers access to all files in ShareIt's "private" directory. It's up to developers to sanitize these cross-app capabilities and only expose the necessary file manager capabilities to Gmail and other apps." If Gmail wants to attach a file to an email, it can do that by showing a list of available file-content providers installed on your phone (it's basically an "open with" dialog box), and the user can pick their favorite file manager, navigate through their storage, and pass the file they want to Gmail. The publication notes: "Android prides itself on intra-app communication, partly because any app can create a content provider and provide its content and services to other apps. Elaborating on one of the vulnerabilities, Ars Technica reveals that ShareIt has one common Android app vulnerability that can give attackers read/write access to all of its files.
