CVE-2021-0973

Published: Dic 15, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-3592 Aliases: GSD-2021-0973
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,0
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
LOW 1,9
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

In isFileUri of UriUtil.java, there is a possible way to bypass ignoring file://URI attachment due to improper handling of case sensitivity. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-197328178

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0002
Percentile
0,0th
Updated

EPSS Score Trend (Last 90 Days)

178

Improper Handling of Case Sensitivity

Incomplete
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Applicable Platforms
Operating Systems: Windows, macOS
View CWE Details
Operating System

Android by Google

cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://source.android.com/security/bulletin/pixel/2021-12-01
https://source.android.com/security/bulletin/pixel/2021-12-01