CVE-2024-46963

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary JavaScript code in the Super Unlimited Video Downloader Android app through a vulnerable component. This affects all Android users running version 5.1.9 or earlier of the application. Attackers can exploit this to potentially steal data or perform unauthorized actions within the app context.

💻 Affected Systems

Products:
  • Super Unlimited Video Downloader - All in One (com.superfast.video.downloader)
Versions: Through 5.1.9
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default; no special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user data within the app, including downloaded videos, browsing history, and potentially device access if combined with other vulnerabilities.

🟠

Likely Case

Data theft from the app, unauthorized downloads, or injection of malicious content into the user's browsing session.

🟢

If Mitigated

Limited impact if app permissions are restricted and user data is minimal, though JavaScript execution still poses risks.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (e.g., clicking a malicious link) but is straightforward once triggered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

1. Uninstall the affected app version. 2. Check Google Play Store for an updated version (if available). 3. Reinstall only if a patched version is confirmed.

🔧 Temporary Workarounds

Disable JavaScript in App Settings

android

If the app allows disabling JavaScript, this may prevent exploitation.

Restrict App Permissions

android

Limit app permissions to minimum required (e.g., deny storage, internet if not needed).

🧯 If You Can't Patch

  • Uninstall the application immediately to eliminate risk.
  • Use alternative video downloader apps with better security track records.

🔍 How to Verify

Check if Vulnerable:

Check app version in Android Settings > Apps > Super Unlimited Video Downloader. If version is 5.1.9 or earlier, it is vulnerable.

Check Version:

Not applicable for Android GUI apps; use Settings menu as above.

Verify Fix Applied:

Verify app is uninstalled or updated to a version above 5.1.9 (if available).

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in app logs
  • Unexpected network requests from the app

Network Indicators:

  • Suspicious HTTP requests to external domains from the app
  • Unexpected data exfiltration patterns

SIEM Query:

Not typically applicable for mobile apps; monitor for app removal or update events in MDM logs.

🔗 References

📤 Share & Export