The ES File Explorer is the most popular android file manager that has more than 500 million users worldwide according to the app developer. The app available on Google play since 2014, it help’s in managing your Android phone and tablet.
French security researcher who goes online with online handle Elliot Alderson discovered a vulnerability that allows attackers sitting on the same network can seize any files from your phone and to launch apps.
Once you launch the app it starts an HTTP server locally running on the port 59777, an attacker could send a JSON payload on this port to the victim device. The vulnerability can be tracked as CVE-2019-6447 affects 4.1.9.7.4 version and below.
The TCP port remains open even after the app has been closed and continues to accept the unauthenticated json request over HTTP, reads the PoC published by Baptiste.
Proof Of Concept shows the following information can be retrived
Security researcher Lukas Stefanko discovered another vulnerability in the ES File Explorer app that allows a local attacker to exploit the vulnerability and to intercept the traffic exchange.
Now the ES File Explorer fixed the HTTP vulnerability and the users who are using file explorer version below 4.1.9.7.4 are recommended to update with 4.1.9.9.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Android Released First Security updates for 2019 & Fixed 13 vulnerabilities – Update Your Phone Now
Spyware From Google Play as a Legitimate Android Apps That Infected 196 Country Users
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…