Security risk with sqlite db in Jolla! Passwords in plain text in user space! [answered]
Dear Jolla Team, I found out today that a Jolla Phone which is connected via USB gives complete access to the folder Sailfish\Phone Memory.config\signond. Within this folder are lying 2 sqlite databases. Both can be opened with a stadard SQLite Manager like, for example, the Firefox Extension https://code.google.com/p/sqlite-manager/. In both cases the databases can be accessed without knowing any passwort. Inside I found my eMail-Passwort in clearcase-readable.
I think this is a security risk since connecting a phone to the wrong computer could give a script a chance to copy these dbs directly and giving my credentials for 3rd party accounts.
I know that this is not so likely to happen but the fact that one can simply access these files via windows explorer could give even other possibilities to read these files.
I think two steps should be performed, set a user password for the sqlite dbs and/or encrypt the password. Even if both methods can be broken by brute force it will at least raise the efforts needed to use the information.
Greetings
The filesystem will not be exported by USB if the devicelock is on. So you can already avoid this by using that.
Philippe De Swert ( 2014-04-15 12:04:37 +0200 )editYes, but that doesn't solve the problem. If I connect an active phone, for example, because I just realised the batt is low, the data/file is still not save. Who would lock his phone right before connecting it (him/herself) for charging? And everytime I unlock the phone while it's still connected via usb I am exposing the files again and again.
PatsJolla ( 2014-04-15 12:15:11 +0200 )edit@PatsJolla: That's why there is charging only ;) That does not expose any data to a computer.
Philippe De Swert ( 2014-04-15 12:37:14 +0200 )edit@Phillippe I don't even get the question weather to switch to charging only or not. Please don't explain me now how to go to settings and change this. I know it's possible but it's nonsense I don't want to chage phone defaults to "reset-to-default" because there could be a security risk connecting the phone to usb for charging and exposing its content at the same time. How should I cover then possible bugs that still have not been found in default mode? - possible own PC infection not even told
PatsJolla ( 2014-04-15 12:48:26 +0200 )edit@PatsJolla: I was just telling you about a work-around for now. And personally having the phone ask makes sense to me as I don't want data exposed when I connect my phone to an unknown pc or charging point. So in one way it is weird you are less worried about exposing ALL your data that way, to any random PC, than some more complex attack vector like reading from a database though USB in a specific dir.
Anyhow it is a bug and it is reported. Passwords should never ever be stored in plain text.
Philippe De Swert ( 2014-04-15 13:37:05 +0200 )edit