Vulnerability Description
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | >= 12.0, <= 13.0 | |
| Lg | V60 Thin Q 5G | - |
Related Weaknesses (CWE)
References
- https://lgsecurity.lge.com/bulletins/mobile#updateDetailsVendor Advisory
- https://lgsecurity.lge.com/bulletins/mobile#updateDetailsVendor Advisory
FAQ
What is CVE-2023-44129?
CVE-2023-44129 is a vulnerability with a CVSS score of 3.6 (LOW). The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity"...
How severe is CVE-2023-44129?
CVE-2023-44129 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-44129?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android, Lg V60 Thin Q 5G.