Cythera Cyber Security

Genero Enterprise — Multiple Issues

A combined Server-Side Request Forgery and Path Traversal vulnerability was discovered in Precisely Spectrum Spatial Analyst v2020.1.0 S44. These flaws could be chained to bypass authentication mechanisms in the interactive mapping application.
Talk to an expert

Introduction‚Äç

During an engagement, Cythera assessed several components built with Genero Enterprise. The review included:- Android apps published on the Google Play Store developed using Genero Mobile for Android (GMA)- iOS apps from Apple’s App Store created using Genero Mobile for iOS (GMI)- A Genero Desktop Client (GDC) installer used on internal staff machines

The Vulnerability

During the assessment, multiple security issues were uncovered, with the most critical ones tied to the software platforms listed above. Although the root causes differed, all stemmed from attempts to reimplement essential features that, in their standard forms, include established security controls. This reinforces the importance of exercising caution when redeveloping core functionalities.

What is Genero?

Genero is a product suite maintained by Four Js, designed to help developers build a wide range of services and applications using a single language and consistent layout syntax. It simplifies development by abstracting the technical details of the underlying systems, allowing both front-end and back-end applications to be deployed across various platforms with minimal adjustments.

Due to its broad capabilities, Genero includes many services and tools, several of which required patching when vulnerabilities were discovered.

Deeplinking to Remote Code Execution (RCE) — CVE-2022-29714

How the Vulnerability Was Found

During testing of an Android application developed with Genero, three things stood out:

  • Files with unknown extensions in the /assets/app/ directory within the APK.
  • The app's entry point related to a third-party component.
  • Inability to intercept traffic from both Android and iOS versions.

These signs suggested non-standard behaviour, prompting deeper investigation. The AndroidManifest file revealed that the app exported a component named Startup, which could be triggered by explicit intents from other applications on the device.

This alone isn’t necessarily a problem, but further analysis found that the app did not adequately validate or sanitise input from those intents. As a result, a malicious app on the same device could exploit the exported component to trigger unintended behaviour.

How the Exploit Works

The vulnerable component, once triggered, passes data from the malicious intent into a service called ConnectivityService. This service then uses the intent data without proper validation, enabling an attacker to:

  • Force the target app into debug or QA mode.
  • Display arbitrary web content.
  • Load and run arbitrary Genero applications.

The conditions required for successful exploitation included:

  • A malicious app must be present on the same device.
  • The target app must not already have the ConnectivityService running.
  • The malicious intent data is repackaged but still improperly handled.

Proof of Concept

A proof of concept demonstrated that the attacker could drop a compiled Genero application onto the device's external storage and direct the vulnerable app to run it. The crafted payload, when executed, could display system information or interact with Android components — essentially allowing remote code execution (RCE) within the app's permissions.

For more information, refer to CVE-2022-29714 in the relevant security advisory.

Lack of Certificate Validation — CVE-2022-29715, CVE-2022-29716, CVE-2022-29717

Another critical issue was discovered in how Genero applications handled certificate validation. The implementation did not properly validate certificates against a trusted certificate store. This flaw made Genero applications vulnerable to Person-in-the-Middle (PitM) attacks, where a threat actor could intercept and tamper with traffic using an arbitrary certificate.

This affected:

  • Android applications (CVE-2022-29716)
  • iOS applications (CVE-2022-29715)
  • The Genero Desktop Client, as confirmed by testing against a rogue SSH server (CVE-2022-29717)


CIO
Government Agency
Cythera operates as an extension of our team. When we call there is an immediate response and the person that answers our call is the person that resolves our issue. Cythera understands our network, and more importantly, has taken the time to understand our business. We find it easy to work with Cythera. They are approachable, flexible and have taken the time to build deep relationships with our team. It is a partnership and friendship. Cythera’s personalised, highly specialised services makes all the difference. We would recommend Cythera to anyone in the industry looking for a managed services partner.
Expert methods

We have the tools to pinpoint risks

Whether it’s hidden vulnerabilities or patterns you might miss, we help you stay one step ahead and make confident, informed decisions. Understand how our services can help your business uncover critical risks

Talk to an expert
Employee Cyber Training & Awareness
Your people are your first line of defence. Our cyber training builds awareness sharpens instincts and turns everyday staff into assets.
Advisory
When clarity is critical and stakes are high, our advisory services deliver strategic, executive-level security expertise that empowers decision-making and resilient operations.