Description
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.
Remediation
References
https://developer.android.com/reference/com/google/android/play/core/release-notes#1-7-2
https://blog.oversecured.com/Oversecured-automatically-discovers-persistent-code-execution-in-the-Google-Play-Core-Library/
Related Vulnerabilities
CVE-2022-24814 Vulnerability in npm package directus
CVE-2020-2114 Vulnerability in maven package org.jenkins-ci.plugins:s3
CVE-2020-2259 Vulnerability in maven package org.jenkins-ci.plugins:computer-queue-plugin
CVE-2023-25822 Vulnerability in maven package com.epam.reportportal:service-api
CVE-2019-10373 Vulnerability in maven package org.jenkins-ci.plugins:build-pipeline-plugin