Published:2012/08/31  Last Updated:2012/08/31

Cybozu Live for Android vulnerable in the WebView class


Cybozu Live for Android contains a vulnerability in the WebView class.

Products Affected

  • Cybozu Live for Android version 1.0.4 and earlier


Cybozu Live for Android is a client software for Cybozu Live. Cybozu Live for Android contains a vulnerability in the WebView class.


When there is a malicious file in the user's Android device, clicking a file:// hyperlink may lead to the malicious file being opened and information managed by the product may be disclosed.


Update the software
Update to the latest version according to the information provided by the developer.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2012.08.31

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication login caused to be created by an administrator
  • Low-Mid
User Interaction Required the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Mid
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures


This analysis assumes that the user is tricked into storing a malicious file.


Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to JPCERT/CC via the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2012-4009
JVN iPedia JVNDB-2012-000082