Exploit the possiblities

Android Next Browser 1.16 Information Leakage

Android Next Browser 1.16 Information Leakage
Posted Feb 9, 2014
Authored by Keith Makan

Next Browser version 1.16 for Android suffers from a browser history information leakage vulnerability.

tags | advisory, info disclosure
MD5 | d2a2cffeccfcf717afb89af3760fb792

Android Next Browser 1.16 Information Leakage

Change Mirror Download
*# Disclosure Date:* 30/01/2014
*# Author: *Keith Makan
*# Vendor or Software Link:*
https://play.google.com/store/apps/details?id=com.jiubang.browser&hl=en

*# Version:* 1.16
*# Tested on:* Android 3.2.1 (HTC Flyer)
*# Tools :* Drozer, Bash

*Description*

Next Browser for Android (version 1.16) suffers from critical information
disclosure vulnerabilities in which applications with no granted
permissions are capable of gaining access to detailed information about a
victim's browsing history. Another vulnerability stemming from the same
issue also allows unauthorized corruption/modification of the browsing
history data.

*Impact*

Unauthorized applications are capable of abusing this vulnerability to leak
data about a victims browsing history. Further more, seeing that this
vulnerability occurs in a browser, attackers could exploit this
vulnerability to force victims to visit malicious sites---should they be
visited from their history.

Currently an estimated 5,000,000 - 10,000,000 installs are affected.

*Timeline*

1. Original Disclosure 30/01/2014
2. -- No Response noted 08/02/2014
3. Public Advisory 09/02/2014

*PoC:*

Browser History Leak : http://i.imgur.com/vJGSh22.png

Browser History Overwrite : http://i.imgur.com/17cvsb2.png
--
<Keith k3170makan <http://about.me/k3170makan> Makan/>

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    12 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close