CVE-2021-33057

Summary

CVECVE-2021-33057
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-07-26 23:15:00 UTC
Updated2022-08-04 16:40:00 UTC
DescriptionThe QQ application 8.7.1 for Android and iOS does not enforce the permission requirements (e.g., android.permission.ACCESS_FINE_LOCATION) for determining the device's physical location. An attacker can use qq.createMapContext to create a MapContext object, use MapContext.moveToLocation to move the center of the map to the device's location, and use MapContext.getCenterLocation to get the latitude and longitude of the current map center.

Risk And Classification

Problem Types: CWE-862

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Tencent Qq 8.7.1 All All All
Application Tencent Qq 8.7.1 All All All

References

ReferenceSourceLinkTags
Tencent 腾讯 MISC tencent.com
Vulnerabilities-Related-to-Mini-Programs-Permissions/QQ applet location permission vulnerability report.pdf at main · BESTICSP/Vulnerabilities-Related-to-Mini-Programs-Permissions · GitHub MISC github.com
arxiv.org/pdf/2205.15202.pdf MISC arxiv.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 630825 QQ application For Android Missing Authorization Vulnerability
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report