关联漏洞
Description
CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability
介绍
# CVE-2023-27703
CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability
fix at pikpak 1.30.1
[Suggested description]
The Android version of pikpak v1.29.2 was discovered to contain an information leak via the debug interface.
------------------------------------------
[Additional Information]
Details link:https://drive.google.com/drive/folders/1Szu9pjivVtG93ceECvnoAjeSABVyfDES?usp=sharing
------------------------------------------
[Vulnerability Type]
Incorrect Access Control
------------------------------------------
[Vendor of Product]
https://mypikpak.com/
------------------------------------------
[Affected Product Code Base]
Android version of pikpak - V1.29.2
------------------------------------------
[Affected Component]
An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability, which can lead to js code execution(XSS) and information leakage
------------------------------------------
[Attack Type]
Local
------------------------------------------
[Impact Information Disclosure]
true
------------------------------------------
[Attack Vectors]
Details link:https://drive.google.com/drive/folders/1Szu9pjivVtG93ceECvnoAjeSABVyfDES?usp=sharing
a bug in the android version of pikpak,is about element debugging interface leakage vulnerability, which can lead to js code execution and information leakage.
The version I am using is:V1.29.2
The trigger point of the vulnerability is at enter the invitation code to redeem premium,Enter an error code at will, and then click the redeem now button continuously,need to continue clicking after prompt too many attempts please try again 24 hours.Then vConsole will pop up at the bottom right of the page.

I think this problem is caused by entering the wrong code many times,you can see some error messages in the log.
I think the appearance of vConsole is very dangerous,It can lead to user information leakage, network request interface debugging, element code leakage, user information changes, etc.
------------------------------------------
[Reference]
https://drive.google.com/drive/folders/1Szu9pjivVtG93ceECvnoAjeSABVyfDES?usp=sharing
------------------------------------------
[Discoverer]
happy0717
文件快照
[4.0K] /data/pocs/d055e90bbe56d151f70b3bd864cd6ae052189a27
├── [116K] pikpak_repetition.jpg
└── [2.3K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →