ID ZDI-13-287 Type zdi Reporter Mitsui Bussan Secure Directions, Inc. Modified 2013-11-09T00:00:00
Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Apps and Samsung WatchOn. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of the WebView JavaScript Bridge. The issue lies in the ability to execute arbitrary commands from JavaScript. This can be chained with the ability to install arbitrary packages to execute code under the context of the current user.
{"enchantments": {"score": {"value": 9.3, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2016-11-09T00:17:58"}, "vulnersScore": 9.3}, "edition": 2, "href": "http://www.zerodayinitiative.com/advisories/ZDI-13-287", "modified": "2013-11-09T00:00:00", "published": "2013-12-31T00:00:00", "history": [{"differentElements": ["modified"], "edition": 1, "lastseen": "2016-09-04T11:33:54", "bulletin": {"published": "2013-12-31T00:00:00", "href": "http://www.zerodayinitiative.com/advisories/ZDI-13-287", "modified": "2013-09-04T00:00:00", "edition": 1, "history": [], "bulletinFamily": "info", "viewCount": 0, "objectVersion": "1.2", "hash": "6b5fe6753fb60412516785a3eeab07d2f0be0b500ca6e827a9ad7dedc1883daf", "title": "(Mobile Pwn2Own) Samsung Apps/WatchON WebView JavaScript Bridge Remote Code Execution Vulnerability", "references": [], "cvelist": ["CVE-2013-7396"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Apps and Samsung WatchOn. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of the WebView JavaScript Bridge. The issue lies in the ability to execute arbitrary commands from JavaScript. This can be chained with the ability to install arbitrary packages to execute code under the context of the current user.", "type": "zdi", "id": "ZDI-13-287", "lastseen": "2016-09-04T11:33:54", "reporter": "Mitsui Bussan Secure Directions, Inc.", "hashmap": [{"hash": "433c63dabb6a947df4cedabbaf60b576", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}, {"hash": "de25676891f23b04ab869e6e7840e9a3", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "5ec63d871ff1040d1507020495c98164", "key": "cvelist"}, {"hash": "b7df05be14abc3e6562f09099835dfdb", "key": "reporter"}, {"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "34e5bb40ff64a1454afb902a6a680ec5", "key": "description"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "041735e351ea4db1208693c0bcf28b5d", "key": "title"}, {"hash": "9d69442dfeec20761a7cc6ede6fd6dc6", "key": "href"}], "cvss": {"score": 0.0, "vector": "NONE"}}}], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Apps and Samsung WatchOn. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of the WebView JavaScript Bridge. The issue lies in the ability to execute arbitrary commands from JavaScript. This can be chained with the ability to install arbitrary packages to execute code under the context of the current user.", "bulletinFamily": "info", "viewCount": 0, "objectVersion": "1.2", "hash": "f4f68af266eff1a7ba65df534d1514fcd78b1a44cfa0dc55f7f4681e83840df2", "title": "(Mobile Pwn2Own) Samsung Apps/WatchON WebView JavaScript Bridge Remote Code Execution Vulnerability", "references": [], "cvelist": ["CVE-2013-7396"], "type": "zdi", "id": "ZDI-13-287", "lastseen": "2016-11-09T00:17:58", "reporter": "Mitsui Bussan Secure Directions, Inc.", "hashmap": [{"hash": "caf9b6b99962bf5c2264824231d7a40c", "key": "bulletinFamily"}, {"hash": "5ec63d871ff1040d1507020495c98164", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "34e5bb40ff64a1454afb902a6a680ec5", "key": "description"}, {"hash": "9d69442dfeec20761a7cc6ede6fd6dc6", "key": "href"}, {"hash": "b7fd0bad9a3db89554b13b658b53fddb", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "433c63dabb6a947df4cedabbaf60b576", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "b7df05be14abc3e6562f09099835dfdb", "key": "reporter"}, {"hash": "041735e351ea4db1208693c0bcf28b5d", "key": "title"}, {"hash": "3dd086b59554fe33c1b8f051475b4b31", "key": "type"}], "cvss": {"score": 0.0, "vector": "NONE"}}