Vulnerability Details : CVE-2022-39349
The Tasks.org Android app is an open-source app for to-do lists and reminders. The Tasks.org app uses the activity `ShareLinkActivity.kt` to handle "share" intents coming from other components in the same device and convert them to tasks. Those intents may contain arbitrary file paths as attachments, in which case the files pointed by those paths are copied in the app's external storage directory. Prior to versions 12.7.1 and 13.0.1, those paths were not validated, allowing a malicious or compromised application in the same device to force Tasks.org to copy files from its internal storage to its external storage directory, where they became accessible to any component with permission to read the external storage. This vulnerability can lead to sensitive information disclosure. All information in the user's notes and the app's preferences, including the encrypted credentials of CalDav integrations if enabled, could be accessed by third party applications installed on the same device. This issue was fixed in versions 12.7.1 and 13.0.1. There are no known workarounds.
Products affected by CVE-2022-39349
- cpe:2.3:a:tasks:tasks:*:*:*:*:*:android:*:*
- cpe:2.3:a:tasks:tasks:13.0.0:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39349
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 5 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39349
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-39349
-
The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.Assigned by: security-advisories@github.com (Secondary)
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2022-39349
-
https://github.com/tasks/tasks/commit/23bf69d3f44b07e4bc62ea107f72103239f5d942
Only accept content URIs in share activity · tasks/tasks@23bf69d · GitHubPatch;Third Party Advisory
-
https://github.com/tasks/tasks/security/advisories/GHSA-8x58-cg74-8jg8
Data exfiltration by malicous app or adb · Advisory · tasks/tasks · GitHubPatch;Third Party Advisory
Jump to