The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://lgsecurity.lge.com/bulletins/mobile#updateDetails |     | 
History
                    Mon, 23 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: LGE
Published:
Updated: 2024-09-23T15:07:26.172Z
Reserved: 2023-09-26T05:57:13.719Z
Link: CVE-2023-44129
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T19:59:50.858Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-09-27T15:19:37.350
Modified: 2024-11-21T08:25:18.383
Link: CVE-2023-44129
 Redhat
                        Redhat
                    No data.