mirror of
https://github.com/github/codeql.git
synced 2025-12-24 04:36:35 +01:00
Update java/ql/src/Security/CWE/CWE-470/FragmentInjection.inc.qhelp
Co-authored-by: Chris Smowton <smowton@github.com>
This commit is contained in:
@@ -6,7 +6,7 @@
|
|||||||
When fragments are instantiated with externally provided names, this exposes any exported activity that dynamically
|
When fragments are instantiated with externally provided names, this exposes any exported activity that dynamically
|
||||||
creates and hosts the fragment to fragment injection. A malicious application could provide the
|
creates and hosts the fragment to fragment injection. A malicious application could provide the
|
||||||
name of an arbitrary fragment, even one not designed to be externally accessible, and inject it into the activity.
|
name of an arbitrary fragment, even one not designed to be externally accessible, and inject it into the activity.
|
||||||
Thus, effectively bypassing access controls and exposing the application to unintended effects.
|
This can bypass access controls and expose the application to unintended effects.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
Fragments are reusable parts of an Android application's user interface.
|
Fragments are reusable parts of an Android application's user interface.
|
||||||
|
|||||||
Reference in New Issue
Block a user