Description
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
Published: 2020-08-12
Score: 8.8 High
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-29748 A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
History

No history.

Subscriptions

Android Play Core Library
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:10.972Z

Reserved: 2020-02-12T00:00:00.000Z

Link: CVE-2020-8913

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-12T07:15:11.883

Modified: 2024-11-21T05:39:40.673

Link: CVE-2020-8913

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses