CVE-2023-6542

Due to lack of proper authorization checks in Emarsys SDK for Android, an attacker can call a particular activity and can forward himself web pages and/or deep links without any validation directly from the host application. On successful attack, an attacker could navigate to arbitrary URL including application deep links on the device.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:emarsys_sdk:3.6.2:*:*:*:*:android:*:*

History

18 Dec 2023, 20:00

Type Values Removed Values Added
First Time Sap
Sap emarsys Sdk
CPE cpe:2.3:a:sap:emarsys_sdk:3.6.2:*:*:*:*:android:*:*
References () https://me.sap.com/notes/3406244 - () https://me.sap.com/notes/3406244 - Permissions Required, Vendor Advisory
References () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

12 Dec 2023, 13:43

Type Values Removed Values Added
Summary
  • (es) Debido a la falta de controles de autorización adecuados en Emarsys SDK para Android, un atacante puede llamar a una actividad particular y reenviarse páginas web y/o enlaces profundos sin ninguna validación directamente desde la aplicación host. En caso de un ataque exitoso, un atacante podría navegar a una URL arbitraria, incluidos enlaces profundos de aplicaciones en el dispositivo.

12 Dec 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 02:15

Updated : 2023-12-18 20:00


NVD link : CVE-2023-6542

Mitre link : CVE-2023-6542

CVE.ORG link : CVE-2023-6542


JSON object : View

Products Affected

sap

  • emarsys_sdk
CWE
CWE-863

Incorrect Authorization