1. Vulnerable Package and Version


2. Details of the Vulnerability


        <provider
            android:name="com.handcent.sms.ti.b"
            android:exported="true"
            android:authorities="com.handcent.messaging.provider.MessageProvider"/> 

3. PoC


We have developed an application that triggers this vulnerability and attached the APK file along with a demonstration vedeo. This PoC demonstrates how the attached application accesses the MessageProvider to leak phone numbers and message history.

The provided code defines two buttons, each triggering a specific query to access different tables from a database through a ContentResolver.

image.png