Skip to content

Arbitrary Code Execution via file download

High
Ch0pin published GHSA-ghf9-x3c5-3mwj May 3, 2023

Package

com.imo.android.imoim (Android)

Affected versions

< 2022.11.2011

Patched versions

2022.11.2011

Description

Impact

A path traversal vulnerability delivered using a deeplink can force the com.imo.android.imoim Android Application up to version 2022.11.1051 to write files into its data directory. This may allow an attacker to write a library file under a special directory that the app uses to dynamically load modules. Loading the library can finally lead to arbitrary code execution with the application's privileges.

Patches

The issue was patched in version: 2022.11.2011

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE ID

CVE-2022-47757

Weaknesses

Credits