|
10 | 10 | the application that created it, and with its same privileges.</p>
|
11 | 11 | <p>If a <code>PendingIntent</code> is configured to be mutable, the fields of its internal Intent can be changed by the
|
12 | 12 | receiving application if they were not previously set. This means that a mutable <code>PendingIntent</code> that has
|
13 |
| - not defined a destination component (that is, an implicit <code>PendingIntent</code>) can be directed to any component |
14 |
| - by the receiving application, and execute an arbitrary action with the privileges of the application that created it.</p> |
15 |
| -<p>If an implicit <code>PendingIntent</code> is wrapped and sent as an extra of an Intent that can be intercepted (that |
16 |
| - is, again, an implicit Intent), any malicious application could obtain the <code>PendingIntent</code>, modify the |
17 |
| - underlying Intent with an arbitrary destination component, and execute the desired action with elevated privileges. |
18 |
| - This could give the malicious application access to private components of the victim application, or the ability to |
19 |
| - perform actions without having the necessary permissions.</p> |
| 13 | + not defined a destination component (that is, an implicit <code>PendingIntent</code>) can be altered to execute an |
| 14 | + arbitrary action with the privileges of the application that created it.</p> |
| 15 | +<p>If an implicit PendingIntent is obtainable by a malicious application by any of the following means:</p> |
| 16 | +<ul> |
| 17 | + <li>It is wrapped and sent as an extra of another implicit Intent</li> |
| 18 | + <li>It is sent as the action of a Slide</li> |
| 19 | + <li>It is sent as the action of a Notification</li> |
| 20 | +</ul> |
| 21 | +<p></p> |
| 22 | +<p>the attacker could modify the underlying Intent and execute an arbitrary action with elevated privileges. |
| 23 | + This could give the malicious application access to private components of the victim application, |
| 24 | + or the ability to perform actions without having the necessary permissions.</p> |
20 | 25 | </overview>
|
21 | 26 |
|
22 | 27 | <recommendation>
|
|
0 commit comments