In the autofill service, the package name that is provided by the app process is trusted inappropriately.  This could lead to information disclosure with no additional execution privileges needed.  User interaction is not needed for exploitation.
                
            References
                    | Link | Resource | 
|---|---|
| https://source.android.com/security/bulletin/2018-06-01 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    19 Nov 2024, 20:25
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.5  | 
| First Time | 
        
        Google
         Google android  | 
|
| CPE | cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*  | 
|
| CWE | NVD-CWE-noinfo | |
| References | () https://source.android.com/security/bulletin/2018-06-01 - Patch, Vendor Advisory | 
15 Nov 2024, 13:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
14 Nov 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-14 23:15
Updated : 2024-11-20 17:35
NVD link : CVE-2017-13227
Mitre link : CVE-2017-13227
CVE.ORG link : CVE-2017-13227
JSON object : View
Products Affected
                - android
 
CWE
                