CVE-2022-39349: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in tasks tasks
The Tasks.org Android app is an open-source app for to-do lists and reminders. The Tasks.org app uses the activity `ShareLinkActivity.kt` to handle "share" intents coming from other components in the same device and convert them to tasks. Those intents may contain arbitrary file paths as attachments, in which case the files pointed by those paths are copied in the app's external storage directory. Prior to versions 12.7.1 and 13.0.1, those paths were not validated, allowing a malicious or compromised application in the same device to force Tasks.org to copy files from its internal storage to its external storage directory, where they became accessible to any component with permission to read the external storage. This vulnerability can lead to sensitive information disclosure. All information in the user's notes and the app's preferences, including the encrypted credentials of CalDav integrations if enabled, could be accessed by third party applications installed on the same device. This issue was fixed in versions 12.7.1 and 13.0.1. There are no known workarounds.
AI Analysis
Technical Summary
CVE-2022-39349 is a vulnerability identified in the Tasks.org Android application, an open-source to-do list and reminder app. The flaw resides in the handling of "share" intents within the app's ShareLinkActivity.kt component. This activity processes incoming intents from other applications on the same device, which may include file attachments specified by arbitrary file paths. Prior to versions 12.7.1 and 13.0.1, the application failed to validate these file paths properly. Consequently, a malicious or compromised app installed on the same Android device could exploit this by crafting intents that reference files located in the internal storage of the Tasks.org app. When processed, Tasks.org would copy these files to its external storage directory, which is accessible to any app with permission to read external storage. This unintended proxy behavior, classified under CWE-441 (Unintended Proxy or Intermediary, aka Confused Deputy) and CWE-668 (Exposure of Resource to Wrong Sphere), effectively allows unauthorized disclosure of sensitive user data. The exposed data could include user notes, app preferences, and critically, encrypted credentials used for CalDav integrations if enabled. The vulnerability does not require user interaction beyond the presence of a malicious app on the device and does not require authentication beyond app installation. The issue was remediated in Tasks.org versions 12.7.1 and 13.0.1 by implementing proper validation of file paths in the share intent handler. No known exploits have been reported in the wild, and no workarounds exist outside of updating the app to a fixed version.
Potential Impact
For European organizations, especially those with employees or users relying on Tasks.org for task management and calendar synchronization via CalDav, this vulnerability poses a significant risk to confidentiality. Sensitive business information, personal notes, and encrypted credentials could be exposed to other applications on the same device if a malicious app is installed. This could lead to unauthorized access to corporate calendars, task data, and potentially broader network access if credentials are reused or decrypted. The integrity and availability of data are less directly impacted; however, the confidentiality breach could facilitate further attacks such as social engineering or lateral movement within corporate environments. Given the widespread use of Android devices in European enterprises and among remote workers, the risk is non-trivial. The vulnerability's exploitation requires a malicious app to be installed on the device, which may be mitigated by organizational controls on app installation. However, in environments with Bring Your Own Device (BYOD) policies or less stringent mobile device management, the threat is more pronounced. The exposure of encrypted credentials, even if encrypted, raises concerns about potential offline decryption attempts or credential reuse attacks.
Mitigation Recommendations
1. Immediate update of the Tasks.org app to version 12.7.1 or 13.0.1 or later to ensure the vulnerability is patched. 2. Enforce strict mobile device management (MDM) policies to control app installations, restricting installation of untrusted or unknown applications that could exploit this vulnerability. 3. Educate users about the risks of installing apps from unofficial sources and the importance of keeping apps updated. 4. Where possible, disable or limit CalDav integration within the app if not essential, reducing the risk exposure of encrypted credentials. 5. Monitor device storage permissions and audit apps with access to external storage to detect potentially malicious behavior. 6. Implement endpoint detection and response (EDR) solutions capable of identifying suspicious inter-app communication or unauthorized file access on Android devices. 7. For organizations with BYOD policies, consider containerization or sandboxing solutions to isolate corporate apps and data from personal apps, minimizing cross-app exploitation risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2022-39349: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in tasks tasks
Description
The Tasks.org Android app is an open-source app for to-do lists and reminders. The Tasks.org app uses the activity `ShareLinkActivity.kt` to handle "share" intents coming from other components in the same device and convert them to tasks. Those intents may contain arbitrary file paths as attachments, in which case the files pointed by those paths are copied in the app's external storage directory. Prior to versions 12.7.1 and 13.0.1, those paths were not validated, allowing a malicious or compromised application in the same device to force Tasks.org to copy files from its internal storage to its external storage directory, where they became accessible to any component with permission to read the external storage. This vulnerability can lead to sensitive information disclosure. All information in the user's notes and the app's preferences, including the encrypted credentials of CalDav integrations if enabled, could be accessed by third party applications installed on the same device. This issue was fixed in versions 12.7.1 and 13.0.1. There are no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-39349 is a vulnerability identified in the Tasks.org Android application, an open-source to-do list and reminder app. The flaw resides in the handling of "share" intents within the app's ShareLinkActivity.kt component. This activity processes incoming intents from other applications on the same device, which may include file attachments specified by arbitrary file paths. Prior to versions 12.7.1 and 13.0.1, the application failed to validate these file paths properly. Consequently, a malicious or compromised app installed on the same Android device could exploit this by crafting intents that reference files located in the internal storage of the Tasks.org app. When processed, Tasks.org would copy these files to its external storage directory, which is accessible to any app with permission to read external storage. This unintended proxy behavior, classified under CWE-441 (Unintended Proxy or Intermediary, aka Confused Deputy) and CWE-668 (Exposure of Resource to Wrong Sphere), effectively allows unauthorized disclosure of sensitive user data. The exposed data could include user notes, app preferences, and critically, encrypted credentials used for CalDav integrations if enabled. The vulnerability does not require user interaction beyond the presence of a malicious app on the device and does not require authentication beyond app installation. The issue was remediated in Tasks.org versions 12.7.1 and 13.0.1 by implementing proper validation of file paths in the share intent handler. No known exploits have been reported in the wild, and no workarounds exist outside of updating the app to a fixed version.
Potential Impact
For European organizations, especially those with employees or users relying on Tasks.org for task management and calendar synchronization via CalDav, this vulnerability poses a significant risk to confidentiality. Sensitive business information, personal notes, and encrypted credentials could be exposed to other applications on the same device if a malicious app is installed. This could lead to unauthorized access to corporate calendars, task data, and potentially broader network access if credentials are reused or decrypted. The integrity and availability of data are less directly impacted; however, the confidentiality breach could facilitate further attacks such as social engineering or lateral movement within corporate environments. Given the widespread use of Android devices in European enterprises and among remote workers, the risk is non-trivial. The vulnerability's exploitation requires a malicious app to be installed on the device, which may be mitigated by organizational controls on app installation. However, in environments with Bring Your Own Device (BYOD) policies or less stringent mobile device management, the threat is more pronounced. The exposure of encrypted credentials, even if encrypted, raises concerns about potential offline decryption attempts or credential reuse attacks.
Mitigation Recommendations
1. Immediate update of the Tasks.org app to version 12.7.1 or 13.0.1 or later to ensure the vulnerability is patched. 2. Enforce strict mobile device management (MDM) policies to control app installations, restricting installation of untrusted or unknown applications that could exploit this vulnerability. 3. Educate users about the risks of installing apps from unofficial sources and the importance of keeping apps updated. 4. Where possible, disable or limit CalDav integration within the app if not essential, reducing the risk exposure of encrypted credentials. 5. Monitor device storage permissions and audit apps with access to external storage to detect potentially malicious behavior. 6. Implement endpoint detection and response (EDR) solutions capable of identifying suspicious inter-app communication or unauthorized file access on Android devices. 7. For organizations with BYOD policies, consider containerization or sandboxing solutions to isolate corporate apps and data from personal apps, minimizing cross-app exploitation risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4923
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:52:05 PM
Last updated: 2/7/2026, 1:01:28 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.