** DISPUTED ** Genymotion Desktop through 3.2.0 leaks the host's clipboard data to the Android application by default. NOTE: the vendor's position is that this is intended behavior that can be changed through the Settings > Device screen.
References
Link | Resource |
---|---|
https://docs.genymotion.com/desktop/latest/02_Application.html | Release Notes Vendor Advisory |
https://github.com/eybisi/misc/tree/main/clipwatch | Product |
https://twitter.com/0xabc0/status/1363788023956185090 | Third Party Advisory |
https://twitter.com/0xabc0/status/1363855602477387783 | Third Party Advisory |
https://twitter.com/0xabc0/status/1363856804602671104 | Third Party Advisory |
https://www.genymotion.com/download/ | Product |
https://www.youtube.com/watch?v=Tod8Q6sf0P8 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-22 17:15
Updated : 2024-08-03 22:15
NVD link : CVE-2021-27549
Mitre link : CVE-2021-27549
CVE.ORG link : CVE-2021-27549
JSON object : View
Products Affected
genymobile
- genymotion_desktop
CWE
CWE-312
Cleartext Storage of Sensitive Information