Описание
In readFrom of Uri.java, there is a possible bad URI permission grant due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Ссылки
- https://android.googlesource.com/platform/frameworks/base/+/4dea696369a309cf39daa3e94fec7156c290a9c2Broken Link
- PatchVendor Advisory
- https://android.googlesource.com/platform/frameworks/base/+/4dea696369a309cf39daa3e94fec7156c290a9c2Broken Link
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*
EPSS
Процентиль: 2%
0.00014
Низкий
7.8 High
CVSS3
Дефекты
CWE-20
CWE-269
Связанные уязвимости
CVSS3: 7.8
github
больше 2 лет назад
In readFrom of Uri.java, there is a possible bad URI permission grant due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
EPSS
Процентиль: 2%
0.00014
Низкий
7.8 High
CVSS3
Дефекты
CWE-20
CWE-269