CVE-2024-0044

In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*

History

28 Jan 2025, 20:15

Type Values Removed Values Added
Summary (en) In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (en) In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
  • () https://android.googlesource.com/platform/frameworks/base/+/836750619a8bce0bf78fe0549f9990e294671563 -
  • () https://android.googlesource.com/platform/frameworks/base/+/954b2874b85b6cd0d6bb12cd677cdf22e5dbd77b -
  • () https://source.android.com/security/bulletin/2024-10-01 -

17 Dec 2024, 15:50

Type Values Removed Values Added
CWE CWE-74
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.7
References () https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792 - () https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792 - Mailing List, Patch
References () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 - () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2 - Third Party Advisory
References () https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html - () https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html - Exploit, Third Party Advisory
References () https://source.android.com/security/bulletin/2024-03-01 - () https://source.android.com/security/bulletin/2024-03-01 - Not Applicable
First Time Google android
Google
CPE cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*

Information

Published : 2024-03-11 17:15

Updated : 2025-01-28 20:15


NVD link : CVE-2024-0044

Mitre link : CVE-2024-0044

CVE.ORG link : CVE-2024-0044


JSON object : View

Products Affected

google

  • android
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-75

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)