|
10 | 10 | the application that created it, and with its same privileges.</p> |
11 | 11 | <p>If a <code>PendingIntent</code> is configured to be mutable, the fields of its internal Intent can be changed by the |
12 | 12 | receiving application if they were not previously set. This means that a mutable <code>PendingIntent</code> that has |
13 | | - not defined a destination component (that is, an implicit <code>PendingIntent</code>) can be directed to any component |
14 | | - by the receiving application, and execute an arbitrary action with the privileges of the application that created it.</p> |
15 | | -<p>If an implicit <code>PendingIntent</code> is wrapped and sent as an extra of an Intent that can be intercepted (that |
16 | | - is, again, an implicit Intent), any malicious application could obtain the <code>PendingIntent</code>, modify the |
17 | | - underlying Intent with an arbitrary destination component, and execute the desired action with elevated privileges. |
18 | | - This could give the malicious application access to private components of the victim application, or the ability to |
19 | | - perform actions without having the necessary permissions.</p> |
| 13 | + not defined a destination component (that is, an implicit <code>PendingIntent</code>) can be altered to execute an |
| 14 | + arbitrary action with the privileges of the application that created it.</p> |
| 15 | +<p>If an implicit PendingIntent is obtainable by a malicious application by any of the following means:</p> |
| 16 | +<ul> |
| 17 | + <li>It is wrapped and sent as an extra of another implicit Intent</li> |
| 18 | + <li>It is sent as the action of a Slide</li> |
| 19 | + <li>It is sent as the action of a Notification</li> |
| 20 | +</ul> |
| 21 | +<p></p> |
| 22 | +<p>the attacker could modify the underlying Intent and execute an arbitrary action with elevated privileges. |
| 23 | + This could give the malicious application access to private components of the victim application, |
| 24 | + or the ability to perform actions without having the necessary permissions.</p> |
20 | 25 | </overview> |
21 | 26 |
|
22 | 27 | <recommendation> |
|
0 commit comments