Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9rg-m5v9-r8xf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811

In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811

EPSS

Процентиль: 1%
0.00008
Низкий

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811

EPSS

Процентиль: 1%
0.00008
Низкий

Дефекты

CWE-732