CVE-2024-26131

Element Android is an Android Matrix Client. Element Android version 1.4.3 through 1.6.10 is vulnerable to intent redirection, allowing a third-party malicious application to start any internal activity by passing some extra parameters. Possible impact includes making Element Android display an arbitrary web page, executing arbitrary JavaScript; bypassing PIN code protection; and account takeover by spawning a login screen to send credentials to an arbitrary home server. This issue is fixed in Element Android 1.6.12. There is no known workaround to mitigate the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:element:element:*:*:*:*:*:android:*:*

History

14 Feb 2025, 17:25

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Element
Element element
CPE cpe:2.3:a:element:element:*:*:*:*:*:android:*:*
References () https://element.io/blog/security-release-element-android-1-6-12 - () https://element.io/blog/security-release-element-android-1-6-12 - Release Notes
References () https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9 - () https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9 - Patch
References () https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm - () https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm - Patch, Vendor Advisory
References () https://support.google.com/faqs/answer/9267555?hl=en - () https://support.google.com/faqs/answer/9267555?hl=en - Technical Description

21 Nov 2024, 09:01

Type Values Removed Values Added
Summary
  • (es) Element Android es un cliente Matrix de Android. Element Android versión 1.4.3 a 1.6.10 es vulnerable a la redirección de intención, lo que permite que una aplicación maliciosa de terceros inicie cualquier actividad interna pasando algunos parámetros adicionales. El posible impacto incluye hacer que Element Android muestre una página web arbitraria, ejecutando JavaScript arbitrario; eludir la protección del código PIN; y toma de control de cuentas generando una pantalla de inicio de sesión para enviar credenciales a un servidor doméstico arbitrario. Este problema se solucionó en Element Android 1.6.12. No se conoce ningún workaround para mitigar el problema.
References () https://element.io/blog/security-release-element-android-1-6-12 - () https://element.io/blog/security-release-element-android-1-6-12 -
References () https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9 - () https://github.com/element-hq/element-android/commit/53734255ec270b0814946350787393dfcaa2a5a9 -
References () https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm - () https://github.com/element-hq/element-android/security/advisories/GHSA-j6pr-fpc8-q9vm -
References () https://support.google.com/faqs/answer/9267555?hl=en - () https://support.google.com/faqs/answer/9267555?hl=en -

29 Feb 2024, 01:44

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 01:44

Updated : 2025-02-14 17:25


NVD link : CVE-2024-26131

Mitre link : CVE-2024-26131

CVE.ORG link : CVE-2024-26131


JSON object : View

Products Affected

element

  • element
CWE
CWE-923

Improper Restriction of Communication Channel to Intended Endpoints

CWE-940

Improper Verification of Source of a Communication Channel

NVD-CWE-noinfo