Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0333

CVE-2023-20955 (High) detected in Settingsandroid-10.0.0_r33

mend-bolt-for-github opened this issue · 2 comments

CVE-2023-20955 - High Severity Vulnerability

Vulnerable Library - Settingsandroid-10.0.0_r33

Library home page: https://android.googlesource.com/platform/packages/apps/Settings

Found in base branch: master

Vulnerable Source Files (1)

/src/com/android/settings/applications/appinfo/AppInfoDashboardFragment.java

Vulnerability Details

In onPrepareOptionsMenu of AppInfoDashboardFragment.java, there is a possible way to bypass admin restrictions and uninstall applications for all users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-258653813

Publish Date: 2023-03-24

URL: CVE-2023-20955

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://android.googlesource.com/platform/packages/apps/Settings/+/f3b323e378ee5d98875711216cbd92f4fa795fc0

Release Date: 2023-03-24

Fix Resolution: android-13.0.0_r32


Step up your Open Source Security Game with Mend here

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.