CVE-2011-2357

Cross-application scripting vulnerability in the Browser URL loading functionality in Android 2.3.4 and 3.1 allows local applications to bypass the sandbox and execute arbitrary Javascript in arbitrary domains by (1) causing the MAX_TAB number of tabs to be opened, then loading a URI to the targeted domain into the current tab, or (2) making two startActivity function calls beginning with the targeted domain's URI followed by the malicious Javascript while the UI focus is still associated with the targeted domain.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*

History

07 Nov 2023, 02:07

Type Values Removed Values Added
References
  • {'url': 'http://android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=096bae248453abe83cbb2e5a2c744bd62cdb620b', 'name': 'http://android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=096bae248453abe83cbb2e5a2c744bd62cdb620b', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • {'url': 'http://android.git.kernel.org/?p=platform/cts.git;a=commit;h=7e48fb87d48d27e65942b53b7918288c8d740e17', 'name': 'http://android.git.kernel.org/?p=platform/cts.git;a=commit;h=7e48fb87d48d27e65942b53b7918288c8d740e17', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • {'url': 'http://android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=afa4ab1e4c1d645e34bd408ce04cadfd2e5dae1e', 'name': 'http://android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=afa4ab1e4c1d645e34bd408ce04cadfd2e5dae1e', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://android.git.kernel.org/?p=platform/packages/apps/Browser.git%3B%20a=commit%3Bh=096bae248453abe83cbb2e5a2c744bd62cdb620b -
  • () http://android.git.kernel.org/?p=platform/cts.git%3Ba=commit%3Bh=7e48fb87d48d27e65942b53b7918288c8d740e17 -
  • () http://android.git.kernel.org/?p=platform/packages/apps/Browser.git%3B%20a=commit%3Bh=afa4ab1e4c1d645e34bd408ce04cadfd2e5dae1e -
References (SREASON) http://securityreason.com/securityalert/8335 - () http://securityreason.com/securityalert/8335 -
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/68937 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68937 -
References (SECTRACK) http://securitytracker.com/id?1025881 - () http://securitytracker.com/id?1025881 -
References (FULLDISC) http://seclists.org/fulldisclosure/2011/Aug/9 - Exploit, Patch () http://seclists.org/fulldisclosure/2011/Aug/9 -
References (SECUNIA) http://secunia.com/advisories/45457 - Vendor Advisory () http://secunia.com/advisories/45457 -
References (BID) http://www.securityfocus.com/bid/48954 - Exploit () http://www.securityfocus.com/bid/48954 -
References (MISC) http://www.infsec.cs.uni-saarland.de/projects/android-vuln/android_xss.pdf - Exploit () http://www.infsec.cs.uni-saarland.de/projects/android-vuln/android_xss.pdf -
References (OSVDB) http://osvdb.org/74260 - () http://osvdb.org/74260 -
References (BUGTRAQ) http://www.securityfocus.com/archive/1/519146/100/0/threaded - () http://www.securityfocus.com/archive/1/519146/100/0/threaded -
References (MISC) http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html - Exploit () http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html -
References (MISC) http://blog.watchfire.com/files/advisory-android-browser.pdf - Exploit () http://blog.watchfire.com/files/advisory-android-browser.pdf -
References (MISC) http://www.infsec.cs.uni-saarland.de/projects/android-vuln/ - Exploit () http://www.infsec.cs.uni-saarland.de/projects/android-vuln/ -

Information

Published : 2011-08-12 18:55

Updated : 2024-02-28 11:41


NVD link : CVE-2011-2357

Mitre link : CVE-2011-2357

CVE.ORG link : CVE-2011-2357


JSON object : View

Products Affected

google

  • android
CWE
CWE-20

Improper Input Validation