"Samsung Galaxy Store Flaw Could Have Allowed Installing Malicious Apps on Target Devices"

A now-patched vulnerability in Samsung's Galaxy Store app could have resulted in remote command execution on affected phones. The flaw is a cross-site scripting (XSS) bug that can be triggered when certain deep links are handled. The flaw affected Galaxy Store version 4.5.32.4 and was discovered by an independent security researcher via the SSD Secure Disclosure program. The researcher focuses on deep links set up for Samsung's Marketing and Content Service (MCS). The Samsung MCS Direct Page website parsed the parameter from the URL and then displayed it, but it did not encode, resulting in an XSS error. The expert discovered two functions, downloadApp and openApp, in the Class EditorialScriptInterface while analyzing the deeplink process code. The two functions enable getting the app ID and downloading or opening it from the store. This means that these two functions can be called using JS code. In this scenario, an attacker can inject and execute arbitrary code into the MCS website. This article continues to discuss the security flaw in the Galaxy Store app for Samsung devices that could have allowed remote command execution on affected phones. 

Security Affairs reports "Samsung Galaxy Store Flaw Could Have Allowed Installing Malicious Apps on Target Devices"

Submitted by Anonymous on