Android, Sensitive Data Exposure in Session Replays, CVE-2024-XXXX (Critical)

Listen to this Post

How the CVE Works

This vulnerability occurs in Android applications using Sentry’s session replay feature alongside Jetpack Compose (v1.8.0-alpha08+). Due to improper masking in text composables, sensitive user input (e.g., passwords, PII) may be captured and transmitted in session recordings. The flaw stems from Sentry’s failure to sanitize Compose UI elements before replay data serialization. Affected versions of `sentry-android` (<8.14.0) do not apply input masking rules to dynamic Compose components, exposing unredacted data to Sentry’s servers.

DailyCVE Form

Platform: Android
Version: <8.14.0
Vulnerability: Data exposure
Severity: Critical
Date: 2024-03-15

Prediction: Patch expected by 2024-04-10

What Undercode Say

logcat | grep "sentry_session_replay_leak"
implementation 'io.sentry:sentry-android:8.14.0'

How Exploit

  • Capture session replays via Sentry.
  • Extract unmasked text composables.
  • Reconstruct sensitive user input.

Protection from this CVE

  • Upgrade to `sentry-android` v8.14.0+.
  • Disable session replays (sampleRate=0.0).
  • Downgrade Jetpack Compose to v1.7.x.

Impact

  • Unauthorized access to credentials/PII.
  • Compliance violations (GDPR, CCPA).
  • Reputational damage.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top