CVE-2023-29459

The laola.redbull application through 5.1.9-R for Android exposes the exported activity at.redbullsalzburg.android.AppMode.Default.Splash.SplashActivity, which accepts a data: URI. The target of this URI is subsequently loaded into the application's webview, thus allowing the loading of arbitrary content into the context of the application. This can occur via the fcrbs schema or an explicit intent invocation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redbull:fc_red_bull_salzburg:*:*:*:*:*:android:*:*

History

06 Jul 2023, 15:47

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Redbull fc Red Bull Salzburg
Redbull
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:redbull:fc_red_bull_salzburg:*:*:*:*:*:android:*:*
References (MISC) https://play.google.com/store/apps/details?id=laola.redbull - (MISC) https://play.google.com/store/apps/details?id=laola.redbull - Product
References (MISC) http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html - (MISC) http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html - Third Party Advisory, VDB Entry

26 Jun 2023, 17:51

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-26 16:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-29459

Mitre link : CVE-2023-29459

CVE.ORG link : CVE-2023-29459


JSON object : View

Products Affected

redbull

  • fc_red_bull_salzburg