Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x9q5-g839-f63f

Опубликовано: 14 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID.

The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID.

EPSS

Процентиль: 80%
0.01327
Низкий

7.8 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.8
nvd
больше 1 года назад

The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID.

EPSS

Процентиль: 80%
0.01327
Низкий

7.8 High

CVSS3

Дефекты

CWE-22