CVE-2022-39349

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-39349
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-39349.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-39349
Aliases
  • GHSA-8x58-cg74-8jg8
Published
2022-10-25T00:00:00Z
Modified
2025-11-28T04:54:50.687770Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Tasks.org vulnerable to data exfiltration by malicous app or adb
Details

The Tasks.org Android app is an open-source app for to-do lists and reminders. The Tasks.org app uses the activity ShareLinkActivity.kt to handle "share" intents coming from other components in the same device and convert them to tasks. Those intents may contain arbitrary file paths as attachments, in which case the files pointed by those paths are copied in the app's external storage directory. Prior to versions 12.7.1 and 13.0.1, those paths were not validated, allowing a malicious or compromised application in the same device to force Tasks.org to copy files from its internal storage to its external storage directory, where they became accessible to any component with permission to read the external storage. This vulnerability can lead to sensitive information disclosure. All information in the user's notes and the app's preferences, including the encrypted credentials of CalDav integrations if enabled, could be accessed by third party applications installed on the same device. This issue was fixed in versions 12.7.1 and 13.0.1. There are no known workarounds.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-441",
        "CWE-668"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39349.json"
}
References

Affected packages

Git / github.com/tasks/tasks

Affected ranges

Type
GIT
Repo
https://github.com/tasks/tasks
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.6.0-lite

10.*

10.0
10.0.1
10.0.2
10.0.3
10.1
10.2
10.3
10.4
10.4.1

11.*

11.0
11.0.1
11.1
11.1.1
11.10
11.10.1
11.10.2
11.11
11.12
11.12.1
11.12.2
11.12.3
11.13
11.2
11.2.1
11.2.2
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.4
11.5
11.5.1
11.6
11.6.1
11.7
11.8
11.9
11.9.1
11.9.2

12.*

12.0
12.1
12.2
12.3
12.4
12.5
12.6
12.6.1
12.7

3.*

3.0.0
3.0.2
3.0.3
3.0.4
3.0.6
3.1.0
3.2.0
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.3.0
3.3.3
3.3.6
3.4.0
3.5.0
3.6.0
3.6.1
3.6.3
3.7.0
3.7.1
3.7.2
3.7.3
3.7.3.1
3.7.4
3.7.5
3.7.6
3.7.7
3.8.0
3.8.0.1
3.8.0.2
3.8.2
3.8.3
3.8.3.1
3.8.4.1
3.8.4.2
3.8.4.4
3.8.5
3.8.5.1
3.9.1
3.9.1.1

4.*

4.0.0
4.0.1
4.0.2
4.1.3
4.1.3.1
4.2.0
4.2.1
4.2.2
4.3.0
4.3.1
4.3.2
4.3.3
4.3.4
4.3.4.1
4.3.4.2
4.4.0
4.4.1
4.4.2
4.4.3
4.4.4
4.4.4.1
4.5.0
4.5.1
4.5.2
4.5.3
4.6.0
4.6.1
4.6.10
4.6.11
4.6.13
4.6.14
4.6.15
4.6.16
4.6.17
4.6.18
4.6.2
4.6.3
4.6.4
4.6.5
4.6.8
4.7.0
4.7.1
4.7.10-fdroid
4.7.11
4.7.11-fdroid
4.7.12
4.7.12-fdroid
4.7.13
4.7.14
4.7.14-fdroid
4.7.15
4.7.15-fdroid
4.7.16
4.7.16-fdroid
4.7.17
4.7.18
4.7.19
4.7.2
4.7.20
4.7.21
4.7.22
4.7.3
4.7.4
4.7.5
4.7.6
4.7.7
4.7.8
4.7.9
4.8.0
4.8.1
4.8.10
4.8.11
4.8.12
4.8.13
4.8.14
4.8.15
4.8.16
4.8.17
4.8.18
4.8.19
4.8.2
4.8.20
4.8.21
4.8.22
4.8.3
4.8.4
4.8.5
4.8.6
4.8.7
4.8.8
4.8.9
4.9.0
4.9.1
4.9.10
4.9.11
4.9.12
4.9.13
4.9.14
4.9.15
4.9.2
4.9.3
4.9.4
4.9.5
4.9.6
4.9.7
4.9.8

5.*

5.0.0
5.0.1
5.0.2
5.1.0
5.1.2
5.1.3
5.1.4
5.1.5
5.2.0
5.2.1
5.3.0
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6

6.*

6.0
6.0.1
6.0.2
6.0.3
6.0.4
6.0.5
6.0.6
6.1
6.1.1
6.1.2
6.1.3
6.2
6.3
6.3.1
6.4
6.4.1
6.4.3
6.4.5
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.6
6.6.1
6.6.2
6.6.3
6.6.4
6.7
6.7.1
6.7.2
6.7.3
6.8
6.8.1
6.9
6.9.1
6.9.2
6.9.3

7.*

7.0
7.1
7.1.1
7.1.2
7.2
7.2.1
7.2.2
7.3
7.3.1
7.3.2
7.4
7.4.1
7.4.2
7.5
7.6
7.6.1
7.7
7.8

8.*

8.0
8.0.1
8.1
8.10
8.11
8.2
8.2.1
8.3
8.4
8.5
8.6
8.6.1
8.7
8.7.1
8.8
8.9
8.9.1
8.9.2

9.*

9.0
9.1
9.2
9.3
9.3.1
9.4
9.4.1
9.5
9.6
9.7
9.7.1
9.7.2
9.7.3

lite-0.*

lite-0.5.0
lite-0.5.1