ID

VAR-201906-0993


CVE

CVE-2018-20523


TITLE

Xiaomi Stock Browser Vulnerable to information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2018-015611

DESCRIPTION

Xiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words, a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request. Xiaomi Stock Browser Contains an information disclosure vulnerability.Information may be obtained. XiaomiRedmiNote5Pro is a smart phone from China Xiaomi Technology (Xiaomi). XiaomiStockBrowser is one of the stock browsers. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The Xiaomi Redmi Note 5 Pro is a smartphone from the Chinese company Xiaomi

Trust: 2.34

sources: NVD: CVE-2018-20523 // JVNDB: JVNDB-2018-015611 // CNVD: CNVD-2019-17323 // VULHUB: VHN-131338 // VULMON: CVE-2018-20523

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-17323

AFFECTED PRODUCTS

vendor:mimodel:redmi goscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi 5 plusscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi 7scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi s2scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 7sscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 7scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 4scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi 4ascope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi k20scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi 7ascope:eqversion: -

Trust: 1.0

vendor:mimodel:stock browserscope:eqversion:10.2.4g

Trust: 1.0

vendor:mimodel:redmi 6ascope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 6 proscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi k20 proscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi 6scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 5 proscope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi y3scope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 5a primescope:eqversion: -

Trust: 1.0

vendor:mimodel:redmi note 5scope:eqversion: -

Trust: 1.0

vendor:xiaomimodel:redmi 6scope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi 6ascope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi 7scope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi k20 proscope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi k20scope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi note 5 proscope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi note 6 proscope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi note 7scope: - version: -

Trust: 0.8

vendor:xiaomimodel:redmi s2scope: - version: -

Trust: 0.8

vendor:xiaomimodel:stock browserscope:eqversion:10.2.4g

Trust: 0.8

vendor:xiaomimodel:stock browser 10.2.4.gscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-17323 // JVNDB: JVNDB-2018-015611 // NVD: CVE-2018-20523

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-20523
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-20523
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-17323
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-300
value: MEDIUM

Trust: 0.6

VULHUB: VHN-131338
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-20523
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-20523
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-17323
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-131338
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-20523
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2018-20523
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-17323 // VULHUB: VHN-131338 // VULMON: CVE-2018-20523 // JVNDB: JVNDB-2018-015611 // CNNVD: CNNVD-201906-300 // NVD: CVE-2018-20523

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.1

problemtype:CWE-200

Trust: 0.9

sources: VULHUB: VHN-131338 // JVNDB: JVNDB-2018-015611 // NVD: CVE-2018-20523

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-300

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201906-300

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015611

PATCH

title:Top Pageurl:https://sec.xiaomi.com/

Trust: 0.8

title:XiaomiRedmiNote5ProXiaomiStockBrowser Information Disclosure Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/163505

Trust: 0.6

title:Xiaomi Redmi Note 5 Pro Xiaomi Stock Browser Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93376

Trust: 0.6

sources: CNVD: CNVD-2019-17323 // JVNDB: JVNDB-2018-015611 // CNNVD: CNNVD-201906-300

EXTERNAL IDS

db:NVDid:CVE-2018-20523

Trust: 3.2

db:PACKETSTORMid:163796

Trust: 1.8

db:JVNDBid:JVNDB-2018-015611

Trust: 0.8

db:CNNVDid:CNNVD-201906-300

Trust: 0.7

db:CNVDid:CNVD-2019-17323

Trust: 0.6

db:EXPLOIT-DBid:50188

Trust: 0.6

db:VULHUBid:VHN-131338

Trust: 0.1

db:VULMONid:CVE-2018-20523

Trust: 0.1

sources: CNVD: CNVD-2019-17323 // VULHUB: VHN-131338 // VULMON: CVE-2018-20523 // JVNDB: JVNDB-2018-015611 // CNNVD: CNNVD-201906-300 // NVD: CVE-2018-20523

REFERENCES

url:https://vishwarajbhattrai.wordpress.com/2019/03/22/content-provider-injection-in-xiaomi-stock-browser

Trust: 2.4

url:https://sec.xiaomi.com

Trust: 2.4

url:http://packetstormsecurity.com/files/163796/xiaomi-10.2.4.g-information-disclosure.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-20523

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20523

Trust: 0.8

url:https://vishwarajbhattrai.wordpress.com/2019/03/22/content-provider-injection-in-xiaomi-stock-browser/

Trust: 0.8

url:https://www.exploit-db.com/exploits/50188

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-17323 // VULHUB: VHN-131338 // VULMON: CVE-2018-20523 // JVNDB: JVNDB-2018-015611 // CNNVD: CNNVD-201906-300 // NVD: CVE-2018-20523

SOURCES

db:CNVDid:CNVD-2019-17323
db:VULHUBid:VHN-131338
db:VULMONid:CVE-2018-20523
db:JVNDBid:JVNDB-2018-015611
db:CNNVDid:CNNVD-201906-300
db:NVDid:CVE-2018-20523

LAST UPDATE DATE

2024-11-23T22:33:50.494000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-17323date:2019-06-18T00:00:00
db:VULHUBid:VHN-131338date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-20523date:2021-08-12T00:00:00
db:JVNDBid:JVNDB-2018-015611date:2019-06-20T00:00:00
db:CNNVDid:CNNVD-201906-300date:2021-08-13T00:00:00
db:NVDid:CVE-2018-20523date:2024-11-21T04:01:39.083

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-17323date:2019-06-14T00:00:00
db:VULHUBid:VHN-131338date:2019-06-07T00:00:00
db:VULMONid:CVE-2018-20523date:2019-06-07T00:00:00
db:JVNDBid:JVNDB-2018-015611date:2019-06-20T00:00:00
db:CNNVDid:CNNVD-201906-300date:2019-06-07T00:00:00
db:NVDid:CVE-2018-20523date:2019-06-07T16:29:00.440