A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
References
Link | Resource |
---|---|
https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ | Exploit Technical Description Third Party Advisory |
https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2 | Release Notes Vendor Advisory |
https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ | Exploit Technical Description Third Party Advisory |
https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2 | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2 - Release Notes, Vendor Advisory |
Information
Published : 2020-08-12 07:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8913
Mitre link : CVE-2020-8913
CVE.ORG link : CVE-2020-8913
JSON object : View
Products Affected
android
- play_core_library