CVE-2023-49000
📋 TL;DR
This vulnerability in ArtistScope ArtisBrowser allows attackers to bypass access restrictions by exploiting the com.artis.browser.IntentReceiverActivity component. It affects ArtisBrowser v34.1.5 and earlier versions. The vendor disputes the vulnerability, claiming ArtisBrowser 34 doesn't support CSS3.
💻 Affected Systems
- ArtistScope ArtisBrowser
📦 What is this software?
Artisbrowser by Artistscope
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing unauthorized access to protected resources, potential data exfiltration, and privilege escalation.
Likely Case
Unauthorized access to restricted application features or data through component interaction bypass.
If Mitigated
Limited impact with proper component isolation and input validation in place.
🎯 Exploit Status
Exploitation involves interacting with exposed IntentReceiverActivity component.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider alternative browsers until vendor provides fix.
🔧 Temporary Workarounds
Disable ArtisBrowser
androidRemove or disable ArtisBrowser application from affected devices.
adb uninstall com.artis.browser
Restrict component access
androidUse Android permissions or security policies to restrict access to IntentReceiverActivity.
🧯 If You Can't Patch
- Isolate affected devices from sensitive networks
- Implement network segmentation and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check ArtisBrowser version in app settings or via 'adb shell dumpsys package com.artis.browser'
Check Version:
adb shell dumpsys package com.artis.browser | grep versionName
Verify Fix Applied:
Verify ArtisBrowser is uninstalled or updated to version above 34.1.5
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to com.artis.browser.IntentReceiverActivity
- Unexpected intent broadcasts to ArtisBrowser
Network Indicators:
- Unusual network traffic from ArtisBrowser app
SIEM Query:
source="android_logs" AND "com.artis.browser.IntentReceiverActivity" AND ("unauthorized" OR "access denied")