OS command injection in VK Messenger - #VU11258
Published: March 26, 2018
Vulnerability identifier: #VU11258
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: VK
Affected software:
VK Messenger
VK Messenger
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to insecure processing of "vk://" URI handler. A remote attacker can create a specially crafted web page, trick a victim into opening it and execute arbitrary OS commands on vulnerable system with privileges of the current user.
Successful exploitation of the vulnerability requires that the victim open a malicious website and that the affected version of the VK Messenger app is not running.
The vulnerability exists due to insecure processing of "vk://" URI handler. A remote attacker can create a specially crafted web page, trick a victim into opening it and execute arbitrary OS commands on vulnerable system with privileges of the current user.
Successful exploitation of the vulnerability requires that the victim open a malicious website and that the affected version of the VK Messenger app is not running.
Remediation
Install the latest version from vendor's website.