Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-10875
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-05 Apr, 2019 | 13:29
Updated At-22 Apr, 2022 | 20:04

A URL spoofing vulnerability was found in all international versions of Xiaomi Mi browser 10.5.6-g (aka the MIUI native browser) and Mint Browser 1.5.3 due to the way they handle the "q" query parameter. The portion of an https URL before the ?q= substring is not shown to the user.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Xiaomi
mi
>>mi_browser>>10.5.6-g
cpe:2.3:a:mi:mi_browser:10.5.6-g:*:*:*:*:*:*:*
Xiaomi
mi
>>mint_browser>>1.5.3
cpe:2.3:a:mi:mint_browser:1.5.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-290Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.htmlcve@mitre.org
Third Party Advisory
VDB Entry
https://sec.xiaomi.com/bug/5bedef67a31ec71ecve@mitre.org
Permissions Required
Vendor Advisory
https://thehackernews.com/2019/04/xiaomi-browser-vulnerability.htmlcve@mitre.org
Exploit
Third Party Advisory
https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.htmlcve@mitre.org
Exploit
Third Party Advisory
Change History
0Changes found

Details not found