Vulnerability Description
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (When in physical possession of the device, opening local files is also possible.) NOTE: As of 2019-09-23, the vendor has not agreed that this issue has serious impact. The vendor states that the issue is not critical because it does not allow Elevation of Privilege, Sensitive Data Leakage, or any critical unauthorized activity from a malicious user. The vendor also states that a victim must first install a malicious APK to their application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Traveloka | Traveloka | 3.14.0 |
Related Weaknesses (CWE)
References
- https://github.com/tarantula-team/Traveloka-Android-App-Critical-VulnerabilityBroken Link
- https://web.archive.org/web/20190923165849/https://github.com/tarantula-team/TraThird Party Advisory
- https://github.com/tarantula-team/Traveloka-Android-App-Critical-VulnerabilityBroken Link
FAQ
What is CVE-2019-16681?
CVE-2019-16681 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (W...
How severe is CVE-2019-16681?
CVE-2019-16681 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16681?
Check the references section above for vendor advisories and patch information. Affected products include: Traveloka Traveloka.