Submit #615253: Aftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijackinginfo

TitleAftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijacking
DescriptionTask Hijacking allows malicious apps to inherit permissions of vulnerable apps and is usually used for phishing login credentials of victims,its used by malicious actors to manipulate or take over tasks in Android, leading to significant vulnerabilities, This vulnerability applies to all Android versions before Android 11. The AndroidManifest.xml configuration needs to be modified to mitigate this attack.
Source⚠️ https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md
User
 fxizenta (UID 28116)
Submission07/13/2025 09:29 (10 months ago)
Moderation08/19/2025 07:20 (1 month later)
StatusAccepted
VulDB entry320514 [AfterShip Package Tracker App up to 5.24.1 on Android com.aftership.AfterShip AndroidManifest.xml improper export of android application components]
Points19

Might our Artificial Intelligence support you?

Check our Alexa App!