Open mend-bolt-for-github[bot] opened 11 months ago
Android framework classes and services
Library home page: https://android.googlesource.com/platform/frameworks/base
Found in HEAD commit: 098773bdbc80dd36be20c3b38616b8af53e37d78
Found in base branch: master
/core/java/android/database/DatabaseUtils.java
In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
Publish Date: 2023-10-27
URL: CVE-2023-40121
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
Step up your Open Source Security Game with Mend here
CVE-2023-40121 - Medium Severity Vulnerability
Vulnerable Library - baseandroid-10.0.0_r44
Android framework classes and services
Library home page: https://android.googlesource.com/platform/frameworks/base
Found in HEAD commit: 098773bdbc80dd36be20c3b38616b8af53e37d78
Found in base branch: master
Vulnerable Source Files (1)
/core/java/android/database/DatabaseUtils.java
Vulnerability Details
In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
Publish Date: 2023-10-27
URL: CVE-2023-40121
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with Mend here