<provider
android:name="com.handcent.sms.ti.b"
android:exported="true"
android:authorities="com.handcent.messaging.provider.MessageProvider"/>
content://com.handcent.messaging.provider.MessageProvider/
, not only can the Message table be exposed, but also other tables used by the app could potentially be revealed as well.We have developed an application that triggers this vulnerability and attached the APK file along with a demonstration vedeo. This PoC demonstrates how the attached application accesses the MessageProvider to leak phone numbers and message history.
The provided code defines two buttons, each triggering a specific query to access different tables from a database through a ContentResolver.