CVE-2010-4804
Description
The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Android browser before 2.3.4 leaks SD card contents via crafted content:// URIs, enabling data theft.
Vulnerability
CVE-2010-4804 is an information disclosure vulnerability in the Android browser on devices running Android versions prior to 2.3.4. The flaw resides in BrowserActivity.java and BrowserSettings.java within com/android/browser/. By crafting a content:// URI, a remote attacker can bypass same-origin restrictions and read arbitrary files from the device's SD card. The browser automatically downloads referenced files without user prompting and, through JavaScript, can open the downloaded HTML file in a local context, where it can read file contents [1].
Exploitation
An attacker must craft a malicious HTML page or email containing JavaScript that references a content:// URI pointing to a known file on the SD card (e.g., photos with predictable naming). The victim must click on the link to trigger the auto-download of a payload file and then, via JavaScript, the payload automatically opens in the browser. No additional authentication is required beyond the victim's interaction [1].
Impact
Successful exploitation allows the attacker to read arbitrary files stored on the device's SD card, leading to unauthorized disclosure of sensitive data such as photos, documents, or other files with known paths. The attack does not grant code execution or elevated privileges beyond the browser's local file access [1].
Mitigation
Android version 2.3.4 (Gingerbread) addresses this issue by disabling automatic file downloads and preventing JavaScript execution in the local context without user consent. Users should update to Android 2.3.4 or later. No official workaround is available for earlier versions; users are advised to avoid clicking suspicious links until the update is applied [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:google:android:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:google:android:*:*:*:*:*:*:*:*range: <=2.3.3
- cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.