4 results (0.021 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An intent redirection vulnerability in the Mi Browser product. This vulnerability is caused by the Mi Browser does not verify the validity of the incoming data. Attackers can perform sensitive operations by exploiting this. Una vulnerabilidad de redireccianamiento de intención en el producto Mi Browser. Esta vulnerabilidad es causada por el Mi Browser no comprueba la validez de los datos entrantes. • https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=148 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must connect to a malicious access point. The specific flaw exists within the handling of HTTP responses to the Captive Portal. A crafted HTML response can cause the Captive Portal to to open a browser to a specified location without user interaction. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-19-659 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the miui.share application. The issue results from the lack of proper validation of user-supplied data, which can result in an arbitrary application download. An attacker can leverage this vulnerability to execute code in the context of the user. • https://www.zerodayinitiative.com/advisories/ZDI-19-660 • CWE-20: Improper Input Validation CWE-356: Product UI does not Warn User of Unsafe Actions •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 2

A URL spoofing vulnerability was found in all international versions of Xiaomi Mi browser 10.5.6-g (aka the MIUI native browser) and Mint Browser 1.5.3 due to the way they handle the "q" query parameter. The portion of an https URL before the ?q= substring is not shown to the user. Se ha detectado una vulnerabilidad de suplantación de URL en todas las versiones internacionales del navegador de Xiaomi Mi (también conocido como el navegador nativo MIUI), en su versión 10.5.6-g, y de Mint Browser, en su versión 1.5.3, en la manera en la que gestionan el parámetro de consultas "q". La porción de una URL https antes de la subcadena ? • http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html https://sec.xiaomi.com/bug/5bedef67a31ec71e https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.html https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html • CWE-290: Authentication Bypass by Spoofing •