Good For Enterprise Android HTML Injection

2015.01.09
Credit: Cl¡udio
Risk: Low
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

https://labs.integrity.pt/articles/good-for-enterprise-android-html-injection-cve-2014-4925/ 1. Vulnerability Properties Title: HTML Injection in Good for Enterprise Android CVE ID: CVE-2014-4925 CVSSv2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) Vendor: Good Technology (http://www1.good.com/) Products: Good for Enterprise Android (possibly others) Advisory Release Date: 8 January 2015 Advisory URL: http://labs.integrity.pt/advisories/cve-2014-4925/ Credits: Discovery and PoC by Cludio Andr <ca[at]integrity.pt> 2. Vulnerability Summary A remote attacker is able to send a crafted email with a payload that redirects the user to a target url as soon as he opens the email. 3. Technical Details The vulnerability can be confirmed by sending a HTML email with the following content: <meta http-equiv=?refresh? content=?0;URL=?http://www.maliciousurl.com?? /> Exploiting this vulnerability could allow an attacker to redirect a user to a malicious website, allowing hooking the browser with malicious JavaScript, launching phishing attacks, etc. 4. Vulnerable Versions Confirmed on version 1.9.0.40, but from the vendor feedback all versions up to 2.8.0.398 should be vulnerable. 5. Solution Currently there is none. The vendor has classified this issue as unfixable and a product limitation. 6. Vulnerability Timeline 16 Apr 2014 ? Vulnerability reported to vendor 7 Jan 2015 ? Vendor gave final feedback that the issue was not a vulnerability and instead being a product limitation and unfixable. -- Cludio Andr Security Consultant @ Integrity S.A www.integrity.pt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top