64 lines
2.4 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-48336",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T18:15:05.027",
"lastModified": "2024-11-04T20:35:10.193",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": " La funci\u00f3n install() de ProviderInstaller.java en Magisk App anterior a la versi\u00f3n Canary 27007 no verifica la aplicaci\u00f3n GMS antes de cargarla, lo que permite que una aplicaci\u00f3n local no confiable sin privilegios adicionales ejecute silenciosamente c\u00f3digo arbitrario en la aplicaci\u00f3n Magisk y escale privilegios a root a trav\u00e9s de un paquete manipulado, tambi\u00e9n conocido como error n.\u00b0 8279. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://github.com/canyie/MagiskEoP",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/topjohnwu/Magisk/commit/c2eb6039579b8a2fb1e11a753cea7662c07bec02",
"source": "cve@mitre.org"
}
]
}