In onSaveRingtone of DefaultRingtonePreference.java, there is a possible inappropriate file read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221041256
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2022-20353 - Medium Severity Vulnerability
Vulnerable Library - Settingsandroid-10.0.0_r12
Library home page: https://android.googlesource.com/platform/packages/apps/Settings
Found in HEAD commit: 5e420749a41e95b681b5064e967e0e6b896323bb
Found in base branch: master
Vulnerable Source Files (2)
/src/com/android/settings/DefaultRingtonePreference.java /src/com/android/settings/DefaultRingtonePreference.java
Vulnerability Details
In onSaveRingtone of DefaultRingtonePreference.java, there is a possible inappropriate file read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221041256
Publish Date: 2022-08-10
URL: CVE-2022-20353
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with Mend here