Kik Messenger for Android spoofing |
NAME
Kik Messenger for Android spoofing
- Platforms Affected:
Kik Messenger for Android - Risk Level:
8.8 - Exploitability:
Proof of Concept - Consequences:
Gain Access
DESCRIPTION
Kik Messenger for Android could allow a remote attacker to conduct spoofing attacks, caused by a XMPP stanza smuggling vulnerability. By sending a specially-crafted XMPP stanzas, an attacker could exploit this vulnerability to triggers a captcha dialog and opens an arbitrary attacker-control webpage on the victim client.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Upgrade to the latest version of Kik Messenger for Android (15.43.1.26155 or later), available from the Kik Web site. See References.
- Reference Link:
https://packetstormsecurity.com/files/167463 - Reference Link:
https://bugs.chromium.org/p/project-zero/issues/detail?id=2284&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.