Good For Enterprise Android HTML Injection

2015.01.09
Credit: Cl¡udio
Risk: Low
Local: No
Remote: Yes
CWE: N/A


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

https://labs.integrity.pt/articles/good-for-enterprise-android-html-injection-cve-2014-4925/ 1. Vulnerability Properties Title: HTML Injection in Good for Enterprise Android CVE ID: CVE-2014-4925 CVSSv2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) Vendor: Good Technology (http://www1.good.com/) Products: Good for Enterprise Android (possibly others) Advisory Release Date: 8 January 2015 Advisory URL: http://labs.integrity.pt/advisories/cve-2014-4925/ Credits: Discovery and PoC by Cludio Andr <ca[at]integrity.pt> 2. Vulnerability Summary A remote attacker is able to send a crafted email with a payload that redirects the user to a target url as soon as he opens the email. 3. Technical Details The vulnerability can be confirmed by sending a HTML email with the following content: <meta http-equiv=?refresh? content=?0;URL=?http://www.maliciousurl.com?? /> Exploiting this vulnerability could allow an attacker to redirect a user to a malicious website, allowing hooking the browser with malicious JavaScript, launching phishing attacks, etc. 4. Vulnerable Versions Confirmed on version 1.9.0.40, but from the vendor feedback all versions up to 2.8.0.398 should be vulnerable. 5. Solution Currently there is none. The vendor has classified this issue as unfixable and a product limitation. 6. Vulnerability Timeline 16 Apr 2014 ? Vulnerability reported to vendor 7 Jan 2015 ? Vendor gave final feedback that the issue was not a vulnerability and instead being a product limitation and unfixable. -- Cludio Andr Security Consultant @ Integrity S.A www.integrity.pt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top