Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48488 | The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set. |
| Link | Providers |
|---|---|
| https://lgsecurity.lge.com/bulletins/mobile#updateDetails |
|
Mon, 23 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: LGE
Published:
Updated: 2024-09-23T15:07:26.172Z
Reserved: 2023-09-26T05:57:13.719Z
Link: CVE-2023-44129
Updated: 2024-08-02T19:59:50.858Z
Status : Modified
Published: 2023-09-27T15:19:37.350
Modified: 2024-11-21T08:25:18.383
Link: CVE-2023-44129
No data.
OpenCVE Enrichment
No data.
EUVD