6.8
CVSSv2

CVE-2012-6636

Published: 03/03/2014 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Android API prior to 17 does not properly restrict the WebView.addJavascriptInterface method, which allows remote malicious users to execute arbitrary methods of Java objects by using the Java Reflection API within crafted JavaScript code that is loaded into the WebView component in an application targeted to API level 16 or earlier, a related issue to CVE-2013-4710.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android api 6.0

google android api 15.0

google android api 3.0

google android api 8.0

google android api 11.0

google android api 9.0

google android api 2.0

google android api 12.0

google android api 7.0

google android api 1.0

google android api 13.0

google android api 14.0

google android api 4.0

google android api

google android api 5.0

google android api 10.0

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'msf/core/exploit/android' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::BrowserExploitServer include Msf::Exploit::Remo ...
Boat Browser versions 80 and 801 suffer from a remote code execution vulnerability ...

Github Repositories

Quick Repo for any Bug Hunter

Bug Bounty Hunting: I prefer below available resources to succeed in Bug Bounty Hunting I'll update this monthly with new techniques Platforms: OpenBugBounty - (XSS/CSRF/IDOR)(Will accept report from any site) BugCrowd HackerOne Cobaltio SynAck (Only invited researchers) Other self hosted programs by different domains (Facebook Whitehat/Google VRP/ AT&T BB) Su

Vulnerability Exploitation

Pentest-Mobile Vulnerability Exploitation Algumas das ferramentas mais utilizadas para testes de segurança em dispositivos Android incluem: AndroBugs Framework: uma ferramenta de análise estática que permite identificar vulnerabilidades em códigos-fonte de aplicativos Android Apktool: uma ferramenta de engenharia reversa que permite analisar e modif

CompatWebView CompatWebView 是为了解决 WebView 的 JavaScriptInterface 注入漏洞 漏洞介绍:CVE-2012-6636 CVE-2013-4710 官方说明:addJavaScriptInterface This method can be used to allow JavaScript to control the host application This is a powerful feature, but also presents a security risk for apps targeting JELLY_BEAN or earlier Apps that target a versi

An app demo for test android webview security issue: CVE-2012-6636

AndroidWebviewInjectDemo An app demo for test android webview security issue: CVE-2012-6636

Recent Articles

Results of PoC Publishing
Securelist • Victor Chebyshev Roman Unuchek Victoria Vlasova • 11 May 2016

There are two crucial features of the Android OS protection system: These approaches greatly complicate malware writers’ lives: to infect a mobile device, they have to resort to ruses of social engineering. The victim is literally tricked into force-installing a Trojan. This is definitely not always possible, as users become more aware, and it is not that easy to trick them. Invisible installation of a malware app onto a mobile device without a user’s knowledge is definitely a daydream of ma...