File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
java/ql/src/experimental/Security/CWE/CWE-470 Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change 33
44<overview >
55<p >
6- If a vulnerable app obtains the ClassLoader of any app based solely on the package name without checking the package signature
7- allow attacker to create application with the targeted package name for "package namespace squatting".
8- If the victim install such malicious app in the same device as the vulnerable app, the vulnerable app would load
6+ If a vulnerable loads classes or code of any app based solely on the package name of the app without
7+ first checking the package signature of the app, this could malicious app with the same package name
8+ to be loaded through "package namespace squatting".
9+ If the victim user install such malicious app in the same device as the vulnerable app, the vulnerable app would load
910classes or code from the malicious app, potentially leading to arbitrary code execution.
1011</p >
1112</overview >
You can’t perform that action at this time.
0 commit comments