In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2018-06-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Nov 2024, 20:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Google
Google android |
|
CPE | cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
References | () https://source.android.com/security/bulletin/2018-06-01 - Patch, Vendor Advisory |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-14 23:15
Updated : 2024-11-20 17:35
NVD link : CVE-2017-13227
Mitre link : CVE-2017-13227
CVE.ORG link : CVE-2017-13227
JSON object : View
Products Affected
- android
CWE