{"vulnerability": "CVE-2023-20947", "sightings": [{"uuid": "b661a9fe-2642-41cc-990a-937bf36dbe91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20947", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1922", "content": "Leveraging Android Permissions: A Solver Approach (CVE-2023-20947)\nhttps://blog.thalium.re/posts/leveraging-android-permissions/", "creation_timestamp": "2023-10-23T03:00:37.000000Z"}, {"uuid": "9c8f323f-9b99-40aa-b251-1bd5a2fffa34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-20947", "type": "seen", "source": "https://t.me/cibsecurity/60719", "content": "\u203c CVE-2023-20947 \u203c\n\nIn getGroupState of GrantPermissionsViewModel.kt, there is a possible way to keep a one-time permission granted due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237405974\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-24T23:51:04.000000Z"}]}