what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Good For Enterprise Android HTML Injection

Good For Enterprise Android HTML Injection
Posted Jan 9, 2015
Authored by Claudio Andre

Good for Enterprise Android suffers from a html injection vulnerability. A remote attacker is able to send a crafted email with a payload that redirects the user to a target url as soon as he opens the email.

tags | exploit, remote
advisories | CVE-2014-4925
SHA-256 | 3cedb9d08e08030894233fae2c3c67c075f1d6bba394e2a490ea5814d8b65ad9

Good For Enterprise Android HTML Injection

Change Mirror Download
https://labs.integrity.pt/articles/good-for-enterprise-android-html-injection-cve-2014-4925/

1. Vulnerability Properties
Title: HTML Injection in Good for Enterprise Android
CVE ID: CVE-2014-4925
CVSSv2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Vendor: Good Technology (http://www1.good.com/)
Products: Good for Enterprise Android (possibly others)
Advisory Release Date: 8 January 2015
Advisory URL: http://labs.integrity.pt/advisories/cve-2014-4925/
Credits: Discovery and PoC by Cláudio André <ca[at]integrity.pt>

2. Vulnerability Summary
A remote attacker is able to send a crafted email with a payload that
redirects the user to a target url as soon as he opens the email.

3. Technical Details
The vulnerability can be confirmed by sending a HTML email with the
following content:

<meta http-equiv=”refresh” content=”0;URL=’http://www.maliciousurl.com’” />

Exploiting this vulnerability could allow an attacker to redirect a user to
a malicious website, allowing hooking the browser with malicious
JavaScript, launching phishing attacks, etc.

4. Vulnerable Versions
Confirmed on version 1.9.0.40, but from the vendor feedback all versions up
to 2.8.0.398 should be vulnerable.

5. Solution
Currently there is none. The vendor has classified this issue as unfixable
and a product limitation.

6. Vulnerability Timeline
16 Apr 2014 – Vulnerability reported to vendor
7 Jan 2015 – Vendor gave final feedback that the issue was not a
vulnerability and instead being a product limitation and unfixable.


--
Cláudio André
Security Consultant @ Integrity S.A
www.integrity.pt


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close