Описание
In openContentUri of ActivityManagerService.java, there is a possible way for a third party app to obtain restricted files due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Ссылки
- https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670dPatch
- PatchVendor Advisory
- https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670dPatch
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*
EPSS
Процентиль: 4%
0.00018
Низкий
5.5 Medium
CVSS3
Дефекты
NVD-CWE-Other
Связанные уязвимости
CVSS3: 5.5
github
больше 2 лет назад
In openContentUri of ActivityManagerService.java, there is a possible way for a third party app to obtain restricted files due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
EPSS
Процентиль: 4%
0.00018
Низкий
5.5 Medium
CVSS3
Дефекты
NVD-CWE-Other