This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must connect to a malicious access point. The specific flaw exists within the handling of HTTP responses to the Captive Portal. A crafted HTML response can cause the Captive Portal to to open a browser to a specified location without user interaction. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7467.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-19-659/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-19-659/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zerodayinitiative.com/advisories/ZDI-19-659/ - Third Party Advisory, VDB Entry |
Information
Published : 2020-02-10 21:50
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13321
Mitre link : CVE-2019-13321
CVE.ORG link : CVE-2019-13321
JSON object : View
Products Affected
mi
- mi_browser
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource