Monorail Project: project-zero Issues People Development process History Sign in
New issue
Advanced search Search tips
Starred by 4 users
Status: Fixed
Owner:
Closed: Feb 2016
Cc:



Sign in to add a comment
Samsung SecEmailUI script injection
Project Member Reported by hawkes@google.com, Jul 29 2015 Back to list
The default Samsung email client's email viewer and composer (implemented in SecEmailUI.apk) doesn't sanitize HTML email content for scripts before rendering the data inside a WebView. This allows an attacker to execute arbitrary JavaScript when a user views a HTML email which contains HTML script tags or other events.

At the very least the JavaScript could exploit the attack surface provided within the WebView control. It might also be possible to access local file content or emails depending on the full configuration of the WebView, although this hasn't been tested fully. 

This can also be exploited locally with the com.samsung.android.email.intent.action.QUICK_REPLY_BACKGROUND intent which will include attacker controlled HTML in the sending email. If the final message was viewed it would be possible for the script to extract the original message from the Document object and potentially post that information to another server.

Attached is a simple SMTP client in Python to send an HTML message with script contents to the device. The "me", "you", "me_password" and "smtp_server" variables need to be changed to ones appropriate for the sending email account and the receiving account on the phone. When the resulting email is viewed it should display the URL of the page which is of the form email://M/N where M is the email account ID and N is the message ID which proves that the script code executed.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
smtp_client.py
830 bytes View Download
Project Member Comment 1 by scvitti@google.com, Jul 30 2015
Labels: -Reported-2015-July-29 Reported-2015-Jul-29
Project Member Comment 2 by natashenka@google.com, Oct 22 2015
This appears to be unfixed on G925VVRU4B0G9
Project Member Comment 3 by natashenka@google.com, Oct 23 2015
Labels: CVE-2015-7893
Project Member Comment 4 by natashenka@google.com, Oct 27 2015
Labels: -Restrict-View-Commit
Fix is scheduled for November MR according to Samsung.
I just tested this on myself. I did get an email but all it said was email//87
Doesn't seem to have done anything at all.
I just tested this on myself. I did get an email but all it said was email//87
Doesn't seem to have done anything at all.


Project Member Comment 7 by natashenka@google.com, Feb 5 2016
Status: Fixed
Closing, as the patch has now been released.
Comment 8 Deleted
Comment 9 Deleted
Sign in to add a comment