#VU41011 SQL injection in Google Android - CVE-2014-8507
Published: December 15, 2014 / Updated: August 9, 2020
Google Android
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html
- http://seclists.org/fulldisclosure/2014/Nov/86
- http://www.securityfocus.com/bid/71310
- http://xteam.baidu.com/?p=167
- https://android.googlesource.com/platform/frameworks/base/+/48ed835468c6235905459e6ef7df032baf3e4df6