<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Mobile_Top_10_2016-M1-Improper_Platform_Usage</id>
		<title>Mobile Top 10 2016-M1-Improper Platform Usage - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Mobile_Top_10_2016-M1-Improper_Platform_Usage"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;action=history"/>
		<updated>2026-04-28T14:56:51Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=227052&amp;oldid=prev</id>
		<title>Milan Singh Thakur at 05:56, 6 March 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=227052&amp;oldid=prev"/>
				<updated>2017-03-06T05:56:23Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 05:56, 6 March 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l16&quot; &gt;Line 16:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 16:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/td&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/td&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;#160;  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;#160;  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. Any exposed API call can serve as attack vector here&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/td&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/td&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Milan Singh Thakur</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=226470&amp;oldid=prev</id>
		<title>Jonathan Carter: Created page with &quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M2-{{Mobile_Top_10_2016:ByTheNumbers               |2               |year=2016               |langua...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=226470&amp;oldid=prev"/>
				<updated>2017-02-17T23:53:59Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M2-{{Mobile_Top_10_2016:ByTheNumbers               |2               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M2-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Nothing&lt;br /&gt;
    |prev=&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In order for this vulnerability to be exploited, the organization must expose a web service or API call that is consumed by the mobile app. The exposed service or API call is implemented using insecure coding techniques that produce an OWASP Top Ten vulnerability within the server. Through the mobile interface, an adversary is able to feed malicious inputs or unexpected sequences of events to the vulnerable endpoint. Hence, the adversary realizes the original OWASP Top Ten vulnerability on the server.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact of this vulnerability corresponds to the technical impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category with a technical impact of moderate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact of this vulnerability corresponds to the business impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category's business impacts.&lt;br /&gt;
     &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2016|language=en}}&lt;br /&gt;
The defining characteristic of risks in this category is that the platform (iOS, Android, Windows Phone, etc.) provides a feature or a capability that is documented and well understood. The app fails to use that capability or uses it incorrectly. This differs from other mobile top ten risks because the design and implementation is not strictly the app developer's issue.&lt;br /&gt;
&lt;br /&gt;
There are several ways that mobile apps can experience this risk.&lt;br /&gt;
&lt;br /&gt;
#'''Violation of published guidelines.''' All platforms have development guidelines for security (c.f., ((Android)), ((iOS)), ((Windows Phone))). If an app contradicts the best practices recommended by the manufacturer, it will be exposed to this risk. For example, there are guidelines on how to use the iOS Keychain or how to secure exported services on Android. Apps that do not follow these guidelines will experience this risk.&lt;br /&gt;
#'''Violation of convention or common practice.''' Not all best practices are codified in manufacturer guidance. In some instances, there are de facto best practices that are common in mobile apps.&lt;br /&gt;
#'''Unintentional Misuse.''' Some apps intend to do the right thing, but actually get some part of the implementation wrong. This could be a simple bug, like setting the wrong flag on an API call, or it could be a misunderstanding of how the protections work.&lt;br /&gt;
&lt;br /&gt;
Failures in the platform's permission models fall into this category. For example, if the app requests too many permissions or the wrong permissions, that is best categorised here. &lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
Secure coding and configuration practices must be used on server-side of the mobile application. For specific vulnerability information, refer to the OWASP Web Top Ten or Cloud Top Ten projects.&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2016|language=en}}&lt;br /&gt;
Because there are several platforms, each with hundreds or thousands of APIs, the examples in this section only scratch the surface of what is possible.'''&lt;br /&gt;
&lt;br /&gt;
'''App Local Storage Instead of Keychain'''&lt;br /&gt;
The iOS Keychain is a secure storage facility for both app and system data. On iOS, apps should use it to store any small data that has security significance (session keys, passwords, device enrolment data, etc.). A common mistake is to store such items in app local storage. Data stored in app local storage is available in unencrypted iTunes backups (e.g., on the user's computer). For some apps, that exposure is inappropriate. &lt;br /&gt;
&lt;br /&gt;
Below, you can see that there are many risks and vulnerabilities that you must mitigate in order to satisfy M1:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CloudTT_thum.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project]]     [[File:WebTT_thumb.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project]]&amp;lt;/center&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
=== The Worst Offenders ===&lt;br /&gt;
&lt;br /&gt;
Below is a list vulnerability types that OWASP sees most often within mobile applications:&lt;br /&gt;
&lt;br /&gt;
;Poor Web Services Hardening&lt;br /&gt;
: Logic flaws&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_business_logic_(OWASP-BL-001) Testing for business logic flaws]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet Business Logic Security Cheat Sheet]&lt;br /&gt;
: Weak Authentication&lt;br /&gt;
:: [https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management OWASP Top Ten Broken Authentication Section]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Guide_to_Authentication Developers Guide for Authentication]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_authentication Testing for Authentication]&lt;br /&gt;
: Weak or no session management&lt;br /&gt;
: Session fixation&lt;br /&gt;
: Sensitive data transmitted using GET method&lt;br /&gt;
&lt;br /&gt;
; Insecure web server configurations&lt;br /&gt;
: Default content&lt;br /&gt;
: Administrative interfaces&lt;br /&gt;
; Injection (SQL, XSS, Command) on both web services and mobile-enabled websites&lt;br /&gt;
; Authentication flaws&lt;br /&gt;
; Session Management flaws&lt;br /&gt;
; Access control vulnerabilities&lt;br /&gt;
; Local and Remote File Includes&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_Ten OWASP Top Ten]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	</feed>