cvelist/2022/29xxx/CVE-2022-29580.json

88 lines
2.9 KiB
JSON
Raw Normal View History

2022-04-22 15:01:23 +00:00
{
2022-12-13 15:00:37 +00:00
"data_version": "4.0",
2022-04-22 15:01:23 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-29580",
2022-12-13 15:00:37 +00:00
"ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
2022-04-22 15:01:23 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-12-13 15:00:37 +00:00
"value": "There exists a path traversal vulnerability in the Android Google Search app. This is caused by the incorrect usage of uri.getLastPathSegment. A symbolic encoded string can bypass the path logic to get access to unintended directories. An attacker can manipulate paths that could lead to code execution on the device. We recommend upgrading beyond version 13.41"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427 Uncontrolled Search Path Element",
"cweId": "CWE-427"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Android Google Search App",
"version": {
"version_data": [
{
"version_value": "10.61",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.google.com/faqs/answer/7496913?hl=en",
"refsource": "MISC",
"name": "https://support.google.com/faqs/answer/7496913?hl=en"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
2022-04-22 15:01:23 +00:00
}
]
}
}