First published: Tue Oct 29 2019(Updated: )
Opera Mini for Android allows attackers to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opera Mini | =44.1.2254.142553 | |
Opera Mini | =44.1.2254.142659 | |
Opera Mini | =44.1.2254.143214 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-18624 is critical with a CVSS score of 9.8.
CVE-2019-18624 allows attackers to bypass intended restrictions on .apk file download/installation in Opera Mini for Android.
The impact of CVE-2019-18624 is that attackers can trick users into downloading and installing malicious files disguised as legitimate ones.
CVE-2019-18624 affects Opera Mini for Android versions 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214.
To fix CVE-2019-18624, update Opera Mini for Android to a version that is not affected by the vulnerability.