CVE-2020-8913

A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:android:play_core_library:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ - Exploit, Technical Description, Third Party Advisory () https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/ - Exploit, Technical Description, Third Party Advisory
References () https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2 - Release Notes, Vendor Advisory () https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2 - Release Notes, Vendor Advisory

Information

Published : 2020-08-12 07:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8913

Mitre link : CVE-2020-8913

CVE.ORG link : CVE-2020-8913


JSON object : View

Products Affected

android

  • play_core_library
CWE
CWE-281

Improper Preservation of Permissions

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')