Injection of arbitrary HTML code in Bosch Video Security Android App
- Advisory ID: BOSCH-SA-844050-BT
- CVE Numbers and CVSS v3.1 Scores:
- Published: 26 Jan 2022
- Last Updated: 26 Jan 2022
A vulnerability was recently discovered in the Android Application Bosch Video Security that allows an attacker to inject random HTML code into a WebView object. This vulnerability could for example allow the loading of malicious forms that could lead to the theft of the user's private information.
This vulnerability was discovered by Sergey Toshin of Oversecured.
For more details please see the description of the vulnerabilities in this advisory.
Bosch rates this vulnerability using the CVSS 3.1 framework with a score of 6.1 (Medium).
- Bosch Video Security Android Application < 3.2.4
Solution and Mitigations
The recommended approach is to update the affected Bosch software to a fixed version. In this particular case, the user should verify that the Android Application is in the latest stable version, 3.2.4. This information can be consulted by accessing the Application settings menu.
CVE description: HTML code injection vulnerability in Android Application, Bosch Video Security, version 3.2.3. or earlier, when successfully exploited allows an attacker to inject random HTML code into a component loaded by WebView, thus allowing the Application to display web resources controlled by the attacker.
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Base Score: 6.1 (Medium)
Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
-  Google Play - Bosch Video Security: https://play.google.com/store/apps/details?id=com.bosch.onsite
Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: firstname.lastname@example.org .
- 26 Jan 2022: Initial Publication