The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://cert.pl/en/posts/2024/11/CVE-2024-11136/ | third party advisory |
https://cert.pl/posts/2024/11/CVE-2024-11136/ | third party advisory |
https://blog.oversecured.com/Content-Providers-and-the-potential-weak-spots-they-can-have/#path-traversal-when-using-data-from-uri | related |