// For flags

CVE-2019-13321

Xiaomi Browser Captive Portal WebView Authorization Bypass Vulnerability

Severity Score

8.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must connect to a malicious access point. The specific flaw exists within the handling of HTTP responses to the Captive Portal. A crafted HTML response can cause the Captive Portal to to open a browser to a specified location without user interaction. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7467.

Esta vulnerabilidad permite a atacantes adyacentes de la red ejecutar código arbitrario en las instalaciones afectadas de Xiaomi Browser versiones anteriores a 10.4.0. Es requerida una interacción del usuario para explotar esta vulnerabilidad, ya que el objetivo debe conectarse a un punto de acceso malicioso. El fallo específico se presenta en el manejo de las respuestas HTTP hacia el Portal Cautivo. Una respuesta HTML diseñada puede causar que el Portal Cautivo abra un navegador a una ubicación específica sin la interacción del usuario. Un atacante puede aprovechar esto en conjunto con otras vulnerabilidades para ejecutar código en el contexto del proceso actual. Fue ZDI-CAN-7467.

This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Mi6. User interaction is required to exploit this vulnerability in that the target must connect to a malicious access point.
The specific flaw exists within the handling of HTTP responses to the Captive Portal. A crafted HTML response can cause the Captive Portal to to open a browser to a specified location without user interaction. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.

*Credits: Anonymous
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-05 CVE Reserved
  • 2019-07-12 CVE Published
  • 2024-07-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (1)
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mi
Search vendor "Mi"
Mi Browser
Search vendor "Mi" for product "Mi Browser"
< 10.4.0
Search vendor "Mi" for product "Mi Browser" and version " < 10.4.0"
-
Affected