mirror of
https://github.com/github/codeql.git
synced 2026-04-27 17:55:19 +02:00
Updated text in LoadClassNoSignatureCheck.qhelp
This commit is contained in:
@@ -3,9 +3,10 @@
|
||||
|
||||
<overview>
|
||||
<p>
|
||||
If a vulnerable app obtains the ClassLoader of any app based solely on the package name without checking the package signature
|
||||
allow attacker to create application with the targeted package name for "package namespace squatting".
|
||||
If the victim install such malicious app in the same device as the vulnerable app, the vulnerable app would load
|
||||
If a vulnerable loads classes or code of any app based solely on the package name of the app without
|
||||
first checking the package signature of the app, this could malicious app with the same package name
|
||||
to be loaded through "package namespace squatting".
|
||||
If the victim user install such malicious app in the same device as the vulnerable app, the vulnerable app would load
|
||||
classes or code from the malicious app, potentially leading to arbitrary code execution.
|
||||
</p>
|
||||
</overview>
|
||||
|
||||
Reference in New Issue
Block a user