Vulnerability Details : CVE-2019-16681
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (When in physical possession of the device, opening local files is also possible.) NOTE: As of 2019-09-23, the vendor has not agreed that this issue has serious impact. The vendor states that the issue is not critical because it does not allow Elevation of Privilege, Sensitive Data Leakage, or any critical unauthorized activity from a malicious user. The vendor also states that a victim must first install a malicious APK to their application.
Vulnerability category: Cross site scripting (XSS)Gain privilege
Products affected by CVE-2019-16681
- cpe:2.3:a:traveloka:traveloka:3.14.0:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-16681
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-16681
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
NIST | |
4.7
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N |
1.6
|
2.7
|
NIST |
CWE ids for CVE-2019-16681
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-16681
-
https://web.archive.org/web/20190923165849/https://github.com/tarantula-team/Traveloka-Android-App-Critical-Vulnerability
GitHub - tarantula-team/Traveloka-Android-App-Critical-Vulnerability: Exported Webview in Traveloka Android App lead to opening arbitrary URLs/XSS and read any protected filesThird Party Advisory
-
https://github.com/tarantula-team/Traveloka-Android-App-Critical-Vulnerability
Page not found · GitHub · GitHubBroken Link
Jump to