CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
12.7%
The vulnerability is that the Messaging (“com.android.mms”) app patched by LG forwards attacker-controlled intents back to the attacker in the exported “com.android.mms.ui.QClipIntentReceiverActivity” activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the “com.lge.message.action.QCLIP” action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the “onActivityResult()” method, they would have access to arbitrary content providers that have the android:grantUriPermissions="true"
flag set.
[
{
"defaultStatus": "unaffected",
"product": "LG V60 Thin Q 5G(LMV600VM)",
"vendor": "LG Electronics",
"versions": [
{
"lessThanOrEqual": "13",
"status": "affected",
"version": "Android 12",
"versionType": "Android"
}
]
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
12.7%