Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pq4w-jf35-7pmx

Опубликовано: 20 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 7.3
CVSS3: 7.5

Описание

There exists a code execution vulnerability in the Car App Android Jetpack Library. In the CarAppService desrialization logic is used that allows for arbitrary java classes to be constructed. In combination with other gadgets, this can lead to arbitrary code execution. An attacker needs to have an app on a victims Android device that uses the CarAppService Class and the victim would need to install a malicious app alongside it. We recommend upgrading the library past version 1.7.0-beta02

There exists a code execution vulnerability in the Car App Android Jetpack Library. In the CarAppService desrialization logic is used that allows for arbitrary java classes to be constructed. In combination with other gadgets, this can lead to arbitrary code execution. An attacker needs to have an app on a victims Android device that uses the CarAppService Class and the victim would need to install a malicious app alongside it. We recommend upgrading the library past version 1.7.0-beta02

EPSS

Процентиль: 16%
0.00051
Низкий

7.3 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-502
CWE-94

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

There exists a code execution vulnerability in the Car App Android Jetpack Library. CarAppService uses deserialization logic that allows construction of arbitrary java classes. This can lead to arbitrary code execution when combined with specific Java deserialization gadgets. An attacker needs to install a malicious application on victims device to be able to attack any application that uses vulnerable library. We recommend upgrading the library past version 1.7.0-beta02.

EPSS

Процентиль: 16%
0.00051
Низкий

7.3 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-502
CWE-94