Show plain JSON{"id": "CVE-2018-20135", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2019-06-07T16:29:00.393", "references": [{"url": "https://security.samsungmobile.com/securityUpdate.smsb", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.adyta.pt/en/2019/01/29/writeup-samsung-app-store-rce-via-mitm-2/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://security.samsungmobile.com/securityUpdate.smsb", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.adyta.pt/en/2019/01/29/writeup-samsung-app-store-rce-via-mitm-2/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-295"}]}], "descriptions": [{"lang": "en", "value": "Samsung Galaxy Apps before 4.4.01.7 allows modification of the hostname used for load balancing on installations of applications through a man-in-the-middle attack. An attacker may trick Galaxy Apps into using an arbitrary hostname for which the attacker can provide a valid SSL certificate, and emulate the API of the app store to modify existing apps at installation time. The specific flaw involves an HTTP method to obtain the load-balanced hostname that enforces SSL only after obtaining a hostname from the load balancer, and a missing app signature validation in the application XML. An attacker can exploit this vulnerability to achieve Remote Code Execution on the device. The Samsung ID is SVE-2018-12071."}, {"lang": "es", "value": "Samsung Galaxy Apps anterior a la versi\u00f3n 4.4.01.7 permite la modificaci\u00f3n del nombre de host usado para el balanceo de carga en instalaciones de aplicaciones mediante un ataque de tipo man-in-the-middle. Un atacante puede enga\u00f1ar a Galaxy apps para que use un nombre de host arbitrario para el que el atacante pueda proporcionar un certificado SSL v\u00e1lido y emular la API de la tienda de aplicaciones para modificar las apps existentes en el momento de la instalaci\u00f3n. El fallo espec\u00edfico implica un m\u00e9todo HTTP para conseguir el nombre de host con equilibrio de carga que aplica SSL solo despu\u00e9s de conseguir un nombre de host del equilibrador de carga y una falta comprobaci\u00f3n de firma de aplicaci\u00f3n en el XML de la aplicaci\u00f3n. Un atacante puede explotar esta vulnerabilidad para lograr la ejecuci\u00f3n de c\u00f3digo remota en el dispositivo. El ID de Samsung es SVE-2018-12071."}], "lastModified": "2024-11-21T04:00:55.430", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:samsung:galaxy_apps:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5F35474-E0BA-4D63-9E50-A8FF3D29472C", "versionEndExcluding": "4.4.01.7"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}