{"vulnerability": "CVE-2022-2000", "sightings": [{"uuid": "372799cc-2384-4b5d-b677-220197e564e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20001", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16527", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-42906\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.\n\ud83d\udccf Published: 2022-10-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-15T16:14:22.051Z\n\ud83d\udd17 References:\n1. https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45\n2. https://github.com/jaspernbrouwer/powerline-gitstatus/releases/tag/v1.3.2\n3. https://lists.debian.org/debian-lts-announce/2023/01/msg00017.html", "creation_timestamp": "2025-05-15T16:35:21.000000Z"}, {"uuid": "f3d326d7-5524-4dbe-b1a6-33c5ce4baf85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/12", "content": "https://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-08-02T21:13:28.000000Z"}, {"uuid": "2d75041e-cf64-4959-b57c-5b6a16b285b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "Telegram/6aFSrxEjJBHYzo7vXi-VfQhiMjzIsqxMO-ocK-7To-fhHw", "content": "", "creation_timestamp": "2023-11-22T10:12:01.000000Z"}, {"uuid": "81617078-4661-48f7-857a-33a8077c1675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/Ent_TranslateIB/81", "content": "#\u0421\u0442\u0430\u0442\u044c\u044f\n\n\u041f\u0435\u0440\u0435\u0432\u043e\u0434: \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0431\u0445\u043e\u0434\u0430 \u044d\u043a\u0440\u0430\u043d\u0430 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Android (CVE-2022-20006)", "creation_timestamp": "2022-07-02T08:16:09.000000Z"}, {"uuid": "d321ed99-c59d-48a4-96d1-43761db97a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/antichat/9949", "content": "https://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-14T11:21:33.000000Z"}, {"uuid": "05aa120f-a3f5-4376-bd02-e089b2178fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20001", "type": "seen", "source": "https://t.me/cibsecurity/51304", "content": "\u203c CVE-2022-42906 \u203c\n\npowerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-13T07:27:25.000000Z"}, {"uuid": "bee777eb-c478-4c7e-a3fd-9ea221fe69cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/arpsyndicate/1864", "content": "#ExploitObserverAlert\n\nCVE-2022-20006\n\nDESCRIPTION: Exploit Observer has 14 entries related to CVE-2022-20006. In several functions of KeyguardServiceWrapper.java and related files,, there is a possible way to briefly view what's under the lockscreen due to a race condition. This could lead to local escalation of privilege if a Guest user is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-151095871\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-12-17T23:22:20.000000Z"}, {"uuid": "ed0d4275-66f0-4e7f-a027-94be97d135a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/196", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-16T09:18:38.000000Z"}, {"uuid": "2b18359e-e261-4cda-91b8-e3e4d02cdd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20004", "type": "seen", "source": "https://t.me/cibsecurity/42278", "content": "\u203c CVE-2022-20004 \u203c\n\nIn checkSlicePermission of SliceManagerService.java, it is possible to access any slice URI due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-179699767\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:33:06.000000Z"}, {"uuid": "2f761f82-c38b-483c-89d7-a2d2949181f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "seen", "source": "https://t.me/cibsecurity/42271", "content": "\u203c CVE-2022-20006 \u203c\n\nIn several functions of KeyguardServiceWrapper.java and related files,, there is a possible way to briefly view what's under the lockscreen due to a race condition. This could lead to local escalation of privilege if a Guest user is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-151095871\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:32:56.000000Z"}, {"uuid": "188d1c13-243d-4a08-a7f8-84881d42941a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20005", "type": "seen", "source": "https://t.me/cibsecurity/42283", "content": "\u203c CVE-2022-20005 \u203c\n\nIn validateApkInstallLocked of PackageInstallerSession.java, there is a way to force a mismatch between running code and a parsed APK . This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219044664\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:33:13.000000Z"}, {"uuid": "1f073ed7-4fb9-48a3-9092-37a916ff9333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20008", "type": "seen", "source": "https://t.me/cibsecurity/42275", "content": "\u203c CVE-2022-20008 \u203c\n\nIn mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:33:02.000000Z"}, {"uuid": "540f135f-59c1-4a24-9fcb-148e37fb2e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20002", "type": "seen", "source": "https://t.me/cibsecurity/39832", "content": "\u203c CVE-2022-20002 \u203c\n\nIn incfs, there is a possible way of mounting on arbitrary paths due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-198657657\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T20:12:31.000000Z"}, {"uuid": "6b1f345c-962b-4766-9786-f85383e20f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20009", "type": "seen", "source": "https://t.me/cibsecurity/42279", "content": "\u203c CVE-2022-20009 \u203c\n\nIn various functions of the USB gadget subsystem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213172319References: Upstream kernel\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-11T00:33:08.000000Z"}, {"uuid": "5ee703c4-0d10-4f03-943c-45b3e458efcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20001", "type": "seen", "source": "https://t.me/cibsecurity/38904", "content": "\u203c CVE-2022-20001 \u203c\n\nfish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-14T21:18:25.000000Z"}, {"uuid": "abf69b11-3e85-46af-a3b0-c04563d8b438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20002", "type": "seen", "source": "https://t.me/androidMalware/1394", "content": "Android: vold's incremental-fs APIs trust paths from system_server for mounting (CVE-2022-20002)\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2221", "creation_timestamp": "2021-12-31T00:04:31.000000Z"}, {"uuid": "44af1f67-dbb6-4715-85d2-f5f5b126239b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6653", "content": "#exploit\n1. CVE-2022-20006:\nLock Screen Bypass Exploit of Android Devices\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a\n\n2. The Journey of Hunting In-the-Wild Windows LPE 0day\nhttps://www.blackhat.com/us-22/briefings/schedule/#the-journey-of-hunting-in-the-wild-windows-lpe-day-26988\n\n3. CVE-2022-33318:\nParacosme - RCE in ICONICS Genesis64\nhttps://github.com/0vercl0k/paracosme", "creation_timestamp": "2022-08-23T15:18:01.000000Z"}, {"uuid": "b2a3eb7a-9728-4816-bea0-0e72316d8c2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1593", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-13T09:16:54.000000Z"}, {"uuid": "85757e62-d3bb-4621-8794-85916fb52756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20006", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6368", "content": "Lock Screen Bypass Exploit of Android Devices (CVE-2022\u201320006)\nhttps://medium.com/maverislabs/lock-screen-bypass-exploit-of-android-devices-cve-2022-20006-604958fcee3a", "creation_timestamp": "2022-07-13T21:13:52.000000Z"}]}