CVE-2023-44129Improper Export of Android Application Components in Google Android

Severity
3.3LOWNVD
EPSS
0.0%
top 90.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 27

Description

The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActiv

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 1.8 | Impact: 1.4

Affected Packages2 packages

NVDgoogle/android12.013.0
CVEListV5lg_electronics/lg_v60_thin_q_5gAndroid 1213

🔴Vulnerability Details

1
GHSA
GHSA-v38f-6chf-2vhr: The vulnerability is that the Messaging ("com2023-09-27