The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
History

Mon, 23 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: LGE

Published: 2023-09-27T14:10:56.347Z

Updated: 2024-09-23T15:07:26.172Z

Reserved: 2023-09-26T05:57:13.719Z

Link: CVE-2023-44129

cve-icon Vulnrichment

Updated: 2024-08-02T19:59:50.858Z

cve-icon NVD

Status : Analyzed

Published: 2023-09-27T15:19:37.350

Modified: 2023-10-02T18:59:15.660

Link: CVE-2023-44129

cve-icon Redhat

No data.