Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w7qc-fcjr-rrg9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

EPSS

Процентиль: 1%
0.00012
Низкий

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 7.8
nvd
около 5 лет назад

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

EPSS

Процентиль: 1%
0.00012
Низкий

Дефекты

CWE-276