Description
In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-50515 | In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution. |
References
History
Mon, 03 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T18:49:28.644Z
Reserved: 2022-12-21T00:00:00.000Z
Link: CVE-2022-47757
Updated: 2024-08-03T15:02:36.498Z
Status : Modified
Published: 2023-05-04T02:15:09.177
Modified: 2024-11-21T07:32:23.040
Link: CVE-2022-47757
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD