| 标题 | Aftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijacking |
|---|
| 描述 | Task Hijacking allows malicious apps to inherit permissions of vulnerable apps and is usually used for phishing login credentials of victims,its used by malicious actors to manipulate or take over tasks in Android, leading to significant vulnerabilities, This vulnerability applies to all Android versions before Android 11. The AndroidManifest.xml configuration needs to be modified to mitigate this attack.
|
|---|
| 来源 | ⚠️ https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md |
|---|
| 用户 | fxizenta (UID 28116) |
|---|
| 提交 | 2025-07-13 09時29分 (10 月前) |
|---|
| 管理 | 2025-08-19 07時20分 (1 month later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 320514 [AfterShip Package Tracker App 直到 5.24.1 于 Android com.aftership.AfterShip AndroidManifest.xml Local Privilege Escalation] |
|---|
| 积分 | 19 |
|---|