Lucene search

K
nvd[email protected]NVD:CVE-2023-0460
HistoryMar 01, 2023 - 5:15 p.m.

CVE-2023-0460

2023-03-0117:15:11
CWE-470
web.nvd.nist.gov
youtube embedded sdk
remote code execution
vulnerability
classloader
malicious app
attack scenario

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The YouTube Embedded 1.2 SDK binds to a service within the YouTube Main App. After binding, a remote context is created with the flags Context.CONTEXT_INCLUDE_CODE | Context.CONTEXT_IGNORE_SECURITY. This allows the client app to remotely load code from YouTube Main App by retrieving the Main Appโ€™s ClassLoader. Aย potential vulnerability in the binding logic used by the client SDK where the SDK ends up calling bindService()ย on a malicious app rather than YT Main App. This creates a vulnerability where the SDK can load the malicious appโ€™s ClassLoader instead, allowing the malicious app to load arbitrary code into the calling app whenever the embedded SDK is invoked.

In order to trigger this vulnerability, an attacker must masquerade the Youtube app and install it on a device, have a second app that uses the Embedded player and typically distribute both to the victim outside of the Play Store.

Affected configurations

NVD
Node
googleyoutube_android_player_apiRange1.2โ€“1.2.2

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for NVD:CVE-2023-0460