VYPR
Unrated severityNVD Advisory· Published Jun 9, 2011· Updated Apr 29, 2026

CVE-2010-4804

CVE-2010-4804

Description

The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Android browser before 2.3.4 leaks SD card contents via crafted content:// URIs, enabling data theft.

Vulnerability

CVE-2010-4804 is an information disclosure vulnerability in the Android browser on devices running Android versions prior to 2.3.4. The flaw resides in BrowserActivity.java and BrowserSettings.java within com/android/browser/. By crafting a content:// URI, a remote attacker can bypass same-origin restrictions and read arbitrary files from the device's SD card. The browser automatically downloads referenced files without user prompting and, through JavaScript, can open the downloaded HTML file in a local context, where it can read file contents [1].

Exploitation

An attacker must craft a malicious HTML page or email containing JavaScript that references a content:// URI pointing to a known file on the SD card (e.g., photos with predictable naming). The victim must click on the link to trigger the auto-download of a payload file and then, via JavaScript, the payload automatically opens in the browser. No additional authentication is required beyond the victim's interaction [1].

Impact

Successful exploitation allows the attacker to read arbitrary files stored on the device's SD card, leading to unauthorized disclosure of sensitive data such as photos, documents, or other files with known paths. The attack does not grant code execution or elevated privileges beyond the browser's local file access [1].

Mitigation

Android version 2.3.4 (Gingerbread) addresses this issue by disabling automatic file downloads and preventing JavaScript execution in the local context without user consent. Users should update to Android 2.3.4 or later. No official workaround is available for earlier versions; users are advised to avoid clicking suspicious links until the update is applied [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Google/Android9 versions
    cpe:2.3:o:google:android:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:google:android:*:*:*:*:*:*:*:*range: <=2.3.3
    • cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*
    • cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.