CVE-2024-45203

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to redirect users to arbitrary websites through the @cosme app's custom URL scheme, potentially leading to phishing attacks. It affects Android versions before 5.69.0 and iOS versions before 6.74.0 of the @cosme app.

💻 Affected Systems

Products:
  • @cosme App for Android
  • @cosme App for iOS
Versions: Android: prior to 5.69.0, iOS: prior to 6.74.0
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable versions are affected; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to sophisticated phishing sites that steal login credentials, payment information, or install malware, leading to account compromise and financial loss.

🟠

Likely Case

Users are redirected to phishing pages attempting to steal @cosme account credentials or personal information through deceptive login forms.

🟢

If Mitigated

With updated app versions, the URL scheme properly validates destinations, preventing unauthorized redirects and maintaining user security.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but is technically simple once the malicious URL is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android: 5.69.0+, iOS: 6.74.0+

Vendor Advisory: https://jvn.jp/en/jp/JVN81570776/

Restart Required: No

Instructions:

1. Open Google Play Store (Android) or App Store (iOS). 2. Search for '@cosme'. 3. Update to version 5.69.0 or higher (Android) or 6.74.0 or higher (iOS).

🔧 Temporary Workarounds

Disable app links handling

all

Prevent the @cosme app from opening custom URL schemes by disabling its link handling in system settings.

🧯 If You Can't Patch

  • Uninstall the vulnerable @cosme app versions until updates can be applied.
  • Educate users to avoid clicking unknown links, especially those claiming to be from @cosme.

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: Android: Settings > Apps > @cosme > App info; iOS: Settings > @cosme.

Check Version:

Not applicable; use GUI method above.

Verify Fix Applied:

Confirm app version is Android 5.69.0+ or iOS 6.74.0+ using the same method.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in app logs or web proxy logs pointing to @cosme URL schemes.

Network Indicators:

  • HTTP requests from the app to unexpected domains shortly after app launch or link clicks.

SIEM Query:

Not applicable due to app-specific nature; monitor for user reports of phishing via @cosme links.

🔗 References

📤 Share & Export