Skip to content

Commit 1e8f98c

Browse files
author
Tod Beardsley
committed
Updated description, credit, and URL
1 parent 1b89242 commit 1e8f98c

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,27 +14,29 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Android Browser RCE Through Google Play Store XFO',
1616
'Description' => %q{
17-
This module combines two vulnerabilities to achieve remote code execution on affected
18-
Android devices. First, the module exploits a Universal Cross-Site Scripting (UXSS)
19-
vulnerability present in versions of Android's open source stock browser (the AOSP Browser)
20-
prior to 4.4. Second, the Google Play store's web interface fails to enforce a
21-
X-Frame-Options: DENY header (XFO) on some error pages, and therefore, can be targeted for script
22-
injection. As a result, this leads to remote code execution through Google Play's remote
23-
installation feature, as any application available on the Google Play store can be installed
24-
and launched on the user's device.
17+
This module combines two vulnerabilities to achieve remote code
18+
execution on affected Android devices. First, the module exploits
19+
CVE-2014-6041, a Universal Cross-Site Scripting (UXSS) vulnerability present in
20+
versions of Android's open source stock browser (the AOSP Browser) prior to
21+
4.4. Second, the Google Play store's web interface fails to enforce a
22+
X-Frame-Options: DENY header (XFO) on some error pages, and therefore, can be
23+
targeted for script injection. As a result, this leads to remote code execution
24+
through Google Play's remote installation feature, as any application available
25+
on the Google Play store can be installed and launched on the user's device.
2526
2627
This module requires that the user is logged into Google with a vulnerable browser.
2728
2829
To list the activities in an APK, you can use `aapt dump badging /path/to/app.apk`.
2930
},
3031
'Author' => [
3132
'Rafay Baloch', # Original UXSS vulnerability
32-
'joev' # Metasploit module
33+
'joev' # Play Store vector and Metasploit module
3334
],
3435
'License' => MSF_LICENSE,
3536
'Actions' => [[ 'WebServer' ]],
3637
'PassiveActions' => [ 'WebServer' ],
3738
'References' => [
39+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041'],
3840
[ 'URL', 'http://1337day.com/exploit/description/22581' ],
3941
[ 'OSVDB', '110664' ],
4042
[ 'CVE', '2014-6041' ]

0 commit comments

Comments
 (0)