6.9 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.013 Low
EPSS
Percentile
85.8%
Cross-application scripting vulnerability in the Browser URL loading functionality in Android 2.3.4 and 3.1 allows local applications to bypass the sandbox and execute arbitrary Javascript in arbitrary domains by (1) causing the MAX_TAB number of tabs to be opened, then loading a URI to the targeted domain into the current tab, or (2) making two startActivity function calls beginning with the targeted domain’s URI followed by the malicious Javascript while the UI focus is still associated with the targeted domain.
android.git.kernel.org/?p=platform/cts.git;a=commit;h=7e48fb87d48d27e65942b53b7918288c8d740e17
android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=096bae248453abe83cbb2e5a2c744bd62cdb620b
android.git.kernel.org/?p=platform/packages/apps/Browser.git;%20a=commit;h=afa4ab1e4c1d645e34bd408ce04cadfd2e5dae1e
blog.watchfire.com/files/advisory-android-browser.pdf
blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html
osvdb.org/74260
seclists.org/fulldisclosure/2011/Aug/9
secunia.com/advisories/45457
securityreason.com/securityalert/8335
securitytracker.com/id?1025881
www.infsec.cs.uni-saarland.de/projects/android-vuln/
www.infsec.cs.uni-saarland.de/projects/android-vuln/android_xss.pdf
www.securityfocus.com/archive/1/519146/100/0/threaded
www.securityfocus.com/bid/48954
exchange.xforce.ibmcloud.com/vulnerabilities/68937