@@ -14,27 +14,29 @@ def initialize(info = {})
14
14
super ( update_info ( info ,
15
15
'Name' => 'Android Browser RCE Through Google Play Store XFO' ,
16
16
'Description' => %q{
17
- This module combines two vulnerabilities to achieve remote code execution on affected
18
- Android devices. First, the module exploits a Universal Cross-Site Scripting (UXSS)
19
- vulnerability present in versions of Android's open source stock browser (the AOSP Browser)
20
- prior to 4.4. Second, the Google Play store's web interface fails to enforce a
21
- X-Frame-Options: DENY header (XFO) on some error pages, and therefore, can be targeted for script
22
- injection. As a result, this leads to remote code execution through Google Play's remote
23
- installation feature, as any application available on the Google Play store can be installed
24
- and launched on the user's device.
17
+ This module combines two vulnerabilities to achieve remote code
18
+ execution on affected Android devices. First, the module exploits
19
+ CVE-2014-6041, a Universal Cross-Site Scripting (UXSS) vulnerability present in
20
+ versions of Android's open source stock browser (the AOSP Browser) prior to
21
+ 4.4. Second, the Google Play store's web interface fails to enforce a
22
+ X-Frame-Options: DENY header (XFO) on some error pages, and therefore, can be
23
+ targeted for script injection. As a result, this leads to remote code execution
24
+ through Google Play's remote installation feature, as any application available
25
+ on the Google Play store can be installed and launched on the user's device.
25
26
26
27
This module requires that the user is logged into Google with a vulnerable browser.
27
28
28
29
To list the activities in an APK, you can use `aapt dump badging /path/to/app.apk`.
29
30
} ,
30
31
'Author' => [
31
32
'Rafay Baloch' , # Original UXSS vulnerability
32
- 'joev' # Metasploit module
33
+ 'joev' # Play Store vector and Metasploit module
33
34
] ,
34
35
'License' => MSF_LICENSE ,
35
36
'Actions' => [ [ 'WebServer' ] ] ,
36
37
'PassiveActions' => [ 'WebServer' ] ,
37
38
'References' => [
39
+ [ 'URL' , 'https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041' ] ,
38
40
[ 'URL' , 'http://1337day.com/exploit/description/22581' ] ,
39
41
[ 'OSVDB' , '110664' ] ,
40
42
[ 'CVE' , '2014-6041' ]
0 commit comments