cve/2023/CVE-2023-40121.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-40121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40121)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2013%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
### POC
#### Reference
- https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253
#### Github
- https://github.com/hshivhare67/platform_framework_base_AOSP6_r22_CVE-2023-40121
- https://github.com/hshivhare67/platform_framework_base_android-4.2.2_r1_CVE-2023-40121
- https://github.com/nidhi7598/frameworks_base_AOSP10_r33_core_CVE-2023-40121
- https://github.com/nomi-sec/PoC-in-GitHub