The Good for Enterprise application 3.0.0.415 for Android does not use signature protection for its Authentication Delegation API intent. Also, the Good Dynamic application activation process does not attempt to detect malicious activation attempts involving modified names beginning with a com.good.gdgma substring. Consequently, an attacker could obtain access to intranet data. This issue is only relevant in cases where the user has already downloaded a malicious Android application.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/536543 | Exploit Mitigation Third Party Advisory VDB Entry |
https://community.blackberry.com/community/blogs/blog/2015/10/02/what-you-need-to-know-modzero-insecure-application-coupling | Third Party Advisory |
https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt | Exploit Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-20 22:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-9232
Mitre link : CVE-2015-9232
CVE.ORG link : CVE-2015-9232
JSON object : View
Products Affected
good
- good_for_enterprise
CWE
CWE-345
Insufficient Verification of Data Authenticity