The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation.
References
Configurations
No configuration.
History
04 Nov 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-829 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
04 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-04 18:15
Updated : 2024-11-04 20:35
NVD link : CVE-2024-48336
Mitre link : CVE-2024-48336
CVE.ORG link : CVE-2024-48336
JSON object : View
Products Affected
No product.
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere