The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-11-04 18:15
Updated : 2024-11-04 20:35
NVD link : CVE-2024-48336
Mitre link : CVE-2024-48336
CVE.ORG link : CVE-2024-48336
JSON object : View
Products Affected
No product.
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere