In isFileUri of FileUtil.java, there is a possible way to bypass the check for a file:// scheme due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215212561
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2022-06-01 | Vendor Advisory |
Configurations
History
24 Jun 2022, 03:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CPE | cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* | |
CWE | CWE-20 | |
References | (MISC) https://source.android.com/security/bulletin/pixel/2022-06-01 - Vendor Advisory |
15 Jun 2022, 15:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-15 14:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-20205
Mitre link : CVE-2022-20205
CVE.ORG link : CVE-2022-20205
JSON object : View
Products Affected
- android
CWE
CWE-20
Improper Input Validation