Genymotion Desktop through 3.2.0 leaks the host's clipboard data to the Android application by default. NOTE: the vendor's position is that this is intended behavior that can be changed through the Settings > Device screen
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://github.com/eybisi/misc/tree/main/clipwatch | product |
https://www.genymotion.com/download/ | product |
https://twitter.com/0xabc0/status/1363856804602671104 | third party advisory |
https://twitter.com/0xabc0/status/1363855602477387783 | third party advisory |
https://twitter.com/0xabc0/status/1363788023956185090 | third party advisory |
https://www.youtube.com/watch?v=Tod8Q6sf0P8 | third party advisory exploit |
https://docs.genymotion.com/desktop/latest/02_Application.html | release notes vendor advisory |