Описание
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-43093
- https://android.googlesource.com/platform/frameworks/base/+/67d6e08322019f7ed8e3f80bd6cd16f8bcb809ed
- https://android.googlesource.com/platform/frameworks/base/+/7f83c671626f9bf993581f4598c22482d87cba10
- https://source.android.com/security/bulletin/2024-11-01
- https://source.android.com/security/bulletin/2025-03-01
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43093
Связанные уязвимости
In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
Уязвимость компонента Android Framework операционной системы Android, позволяющая нарушителю повысить свои привилегии и получить несанкционированноый доступ к каталогам Android/data, Android/obb, Android/sandbox