The Yodobashi application 1.2.1.0 and earlier for Android allows remote attackers to execute arbitrary Java methods, and consequently obtain sensitive information or execute OS commands, via a crafted HTML document.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://jvn.jp/en/jp/JVN70465405/995407/index.html | |
http://jvn.jp/en/jp/JVN70465405/index.html | third party advisory vendor advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000110 | third party advisory vendor advisory |