CVE-2019-6447

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
Configurations

Configuration 1 (hide)

cpe:2.3:a:estrongs:es_file_explorer_file_manager:*:*:*:*:*:android:*:*

History

21 Nov 2024, 04:46

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/fs0c131y/ESFileExplorerOpenPortVuln - Exploit, Third Party Advisory () https://github.com/fs0c131y/ESFileExplorerOpenPortVuln - Exploit, Third Party Advisory
References () https://twitter.com/fs0c131y/status/1085460755313508352 - Third Party Advisory () https://twitter.com/fs0c131y/status/1085460755313508352 - Third Party Advisory

Information

Published : 2019-01-16 14:29

Updated : 2024-11-21 04:46


NVD link : CVE-2019-6447

Mitre link : CVE-2019-6447

CVE.ORG link : CVE-2019-6447


JSON object : View

Products Affected

estrongs

  • es_file_explorer_file_manager
CWE
CWE-306

Missing Authentication for Critical Function