CVE-2024-42041

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary JavaScript code in the Android video downloader app via a vulnerable component. It affects users of AppTool-Browser-Video All Video Downloader version 20-30.05.24 on Android devices. Successful exploitation could lead to data theft or device compromise.

💻 Affected Systems

Products:
  • com.videodownload.browser.videodownloader (AppTool-Browser-Video All Video Downloader)
Versions: 20-30.05.24
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific Android application version; requires app installation and execution.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing data exfiltration, installation of malware, or unauthorized access to sensitive information stored on the device.

🟠

Likely Case

Theft of browser data, session cookies, or credentials stored within the app's context, potentially leading to account takeover.

🟢

If Mitigated

Limited impact if app runs in sandboxed environment with minimal permissions, though JavaScript execution could still access app-specific data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to trigger the vulnerable component, but no authentication is needed once the app is running.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Uninstall the vulnerable app version 20-30.05.24. 2. Check official app stores for updated versions. 3. Reinstall only if a patched version is confirmed available from trusted sources.

🔧 Temporary Workarounds

Uninstall Vulnerable App

android

Remove the vulnerable application from all Android devices

adb uninstall com.videodownload.browser.videodownloader

Disable JavaScript in App

android

If app settings allow, disable JavaScript execution (may break functionality)

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Monitor for unusual app behavior or network connections from the app

🔍 How to Verify

Check if Vulnerable:

Check app version in Android Settings > Apps > AppTool-Browser-Video All Video Downloader > App info

Check Version:

adb shell dumpsys package com.videodownload.browser.videodownloader | grep versionName

Verify Fix Applied:

Verify app is uninstalled or updated to version after 30.05.24

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution errors in app logs
  • Unexpected activity from acr.browser.lightning.DefaultBrowserActivity

Network Indicators:

  • Suspicious outbound connections from the app to unknown domains
  • Unexpected data exfiltration patterns

SIEM Query:

source="android_app_logs" app="com.videodownload.browser.videodownloader" (event="javascript_execution" OR component="DefaultBrowserActivity")

🔗 References

📤 Share & Export