cve/2019/CVE-2019-8791.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-8791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8791)
![](https://img.shields.io/static/v1?label=Product&message=Shazam-Android&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Shazam-iOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20Shazam%20Android%20App%20Version%209.25.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20Shazam%20iOS%20App%20Version%2012.11.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20a%20maliciously%20crafted%20URL%20may%20lead%20to%20an%20open%20redirect&color=brighgreen)
### Description
An issue existed in the parsing of URL schemes. This issue was addressed with improved URL validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to an open redirect.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ashleykinguk/Shazam-CVE-2019-8791-CVE-2019-8792
- https://github.com/developer3000S/PoC-in-GitHub