Microsoft Discovers Severe ‘One-Click’ Exploit for TikTok Android App

Microsoft on Wednesday disclosed details of a now-patched “high severity vulnerability” in the TikTok app for Android that could let attackers take over accounts when victims clicked on a malicious link.

“Attackers could have leveraged the vulnerability to hijack an account without users’ awareness if a targeted user simply clicked a specially crafted link,” Dimitrios Valsamaras of the Microsoft 365 Defender Research Team said in a write-up.

Successful exploitation of the flaw could have allowed malicious actors to access and modify users’ TikTok profiles and sensitive information, leading to the unauthorized exposure of private videos. Attackers could also have abused the bug to send messages and upload videos on behalf of users.

CyberSecurity

The issue, addressed in version 23.7.3, impacts two flavors of its Android app com.ss.android.ugc.trill (for East and Southeast Asian users) and com.zhiliaoapp.musically (for users in other countries except for India, where it’s banned). Combined, the apps have more than 1.5 billion installations between them.

TikTok Android App

Tracked as CVE-2022-28799 (CVSS score: 8.8), the vulnerability has to do with the app’s handling of what’s called a deeplink, a special hyperlink that allows apps to open a specific resource within another app installed on the device rather than directing users to a website.

“A crafted URL (unvalidated deeplink) can force the com.zhiliaoapp.musically WebView to load an arbitrary website,” according to an advisory for the flaw. “This may allow an attacker to leverage an attached JavaScript interface for the takeover with one click.”

TikTok Android App

Put simply, the flaw makes it possible to circumvent the apps’ restrictions to reject untrusted hosts and load any website of the attacker’s choice through the Android System WebView, a mechanism to display web content on other apps.

CyberSecurity

“The filtering takes place on the server-side and the decision to load or reject a URL is based on the reply received from a particular HTTP GET request,” Valsamaras explained, adding the static analysis “indicated that it is possible to bypass the server -side check by adding two additional parameters to the deeplink.”

A consequence of this exploit designed to hijack WebView to load rogue websites is that it could allow the adversary to invoke over 70 exposed TikTok endpoints, effectively compromising a user’s profile integrity. There is no evidence that the bug has been weaponized in the wild.

“From a programming perspective, using JavaScript interfaces poses significant risks,” Microsoft noted. “A compromised JavaScript interface can potentially allow attackers to execute code using the application’s ID and privileges.”

.

Leave a Comment