CVE-2024-0044

In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

No configuration.

History

03 Jul 2024, 01:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-75

12 Mar 2024, 20:15

Type Values Removed Values Added
References
  • () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 -
  • () https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html -
Summary
  • (es) En createSessionInternal de PackageInstallerService.java, existe una posible ejecución como cualquier aplicación debido a una validación de entrada incorrecta. Esto podría conducir a una escalada local de privilegios sin necesidad de permisos de ejecución adicionales. La interacción del usuario no es necesaria para la explotación.
Summary (en) In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (en) In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

11 Mar 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-11 17:15

Updated : 2024-07-03 01:44


NVD link : CVE-2024-0044

Mitre link : CVE-2024-0044

CVE.ORG link : CVE-2024-0044


JSON object : View

Products Affected

No product.

CWE
CWE-75

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)