Vulnerability Description
An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kaiostech | Kaios | 3.0 |
Related Weaknesses (CWE)
References
- https://kaios.dev/cve/1410290ExploitVendor Advisory
- https://kaios.dev/cve/1410290ExploitVendor Advisory
FAQ
What is CVE-2023-33293?
CVE-2023-33293 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An a...
How severe is CVE-2023-33293?
CVE-2023-33293 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33293?
Check the references section above for vendor advisories and patch information. Affected products include: Kaiostech Kaios.