Satheesh575555 / packages_apps_Settings_AOSP10_r33_CVE-2021-0333

Other
0 stars 0 forks source link

CVE-2023-21256 (High) detected in Settingsandroid-10.0.0_r44 #50

Open mend-bolt-for-github[bot] opened 8 months ago

mend-bolt-for-github[bot] commented 8 months ago

CVE-2023-21256 - High Severity Vulnerability

Vulnerable Library - Settingsandroid-10.0.0_r44

Library home page: https://android.googlesource.com/platform/packages/apps/Settings

Found in HEAD commit: a353664da30a0b95adee9281a4af5c1d5cacc22e

Found in base branch: master

Vulnerable Source Files (1)

/src/com/android/settings/homepage/SettingsHomepageActivity.java

Vulnerability Details

In SettingsHomepageActivity.java, there is a possible way to launch arbitrary activities via Settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

Publish Date: 2023-07-13

URL: CVE-2023-21256

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-21256

Release Date: 2023-07-12

Fix Resolution: android-13.0.0_r57


Step up your Open Source Security Game with Mend here