The laola.redbull application through 5.1.9-R for Android exposes the exported activity at.redbullsalzburg.android.AppMode.Default.Splash.SplashActivity, which accepts a data: URI. The target of this URI is subsequently loaded into the application's webview, thus allowing the loading of arbitrary content into the context of the application. This can occur via the fcrbs schema or an explicit intent invocation.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 | |
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2023-06-26T00:00:00
Updated: 2024-12-03T19:05:17.677Z
Reserved: 2023-04-06T00:00:00
Link: CVE-2023-29459
Vulnrichment
Updated: 2024-08-02T14:07:46.248Z
NVD
Status : Modified
Published: 2023-06-26T16:15:09.587
Modified: 2024-12-03T20:15:14.167
Link: CVE-2023-29459
Redhat
No data.