
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability (CVE-2022-47757) was discovered in imo.im version 2022.11.1051. The vulnerability was disclosed on May 3, 2023, affecting the Android application package com.imo.android.imoim. The issue stems from an unsanitized deeplink that can force the application to write files into the application's data directory (NIST, GitHub Advisory).
The vulnerability is classified as a path traversal issue (CWE-22) with a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The technical nature of the vulnerability involves an unsanitized deeplink that can be exploited to write files into the application's data directory, specifically allowing an attacker to save a shared library under a special directory which the app uses to dynamically load modules (NIST).
The successful exploitation of this vulnerability can lead to arbitrary code execution with the application's privileges. This means an attacker could potentially execute malicious code within the context of the affected application, compromising the security of the application and potentially the user's data (GitHub Advisory).
The vulnerability has been patched in version 2022.11.2011 of the application. Users are advised to update to this or later versions to protect against potential exploitation (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."