Researchers found two flaws in Samsung Galaxy Store that could be exploited to install applications or achieve code execution on the devices.
The vulnerability CVE-2023-21433 is an improper access control that can allow local attackers to install apps from the Galaxy App Store.
“It was found that the Galaxy App Store has an exported activity which does not handle incoming intents in a safe manner. This allows other applications installed on the same Samsung device to automatically install any application available on the Galaxy App Store without the user’s knowledge.” reads the advisory published by NCC Group.
It should be noted that due to the changes made to Android 13,
The experts pointed out that this vulnerability only impacts Samsung devices that are running Android 12 and below.
“It was found that a webview within the Galaxy App Store contained a filter which limited which domains that webview could browse to. However, the filter was not properly configured, which would allow the webview to browse to an attacker-controlled domain,” NCC Group continues.
An attacker can trigger the issue by tricking victims into either tapping a malicious hyperlink in Google Chrome or a pre-installed rogue application on a Samsung device that can bypass Samsung’s URL filter and launch a webview to an attacker controlled domain.
The advisory also includes proof-of-concept (PoC) code for both issues.
NCC Group reported the issues to Samsung in November and December 2022, the vulnerabilities were addressed in Galaxy Store version 126.96.36.199.
|[adrotate banner=”9″]||[adrotate banner=”12″]|
The post Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code appeared first on Security Affairs.