Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, and consequently launch an activity or service, via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Nov/86 - Exploit | |
References | () http://www.securityfocus.com/bid/71310 - | |
References | () http://xteam.baidu.com/?p=167 - Exploit | |
References | () https://android.googlesource.com/platform/frameworks/base/+/48ed835468c6235905459e6ef7df032baf3e4df6 - Vendor Advisory |
Information
Published : 2014-12-15 18:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8507
Mitre link : CVE-2014-8507
CVE.ORG link : CVE-2014-8507
JSON object : View
Products Affected
- android
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')