Apktool Vulnerability Allows Attackers to Write Files to Desired Locations on User's System
CVE-2024-21633

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
3 January 2024

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 80%

What is CVE-2024-21633?

Apktool, a widely used tool for reverse engineering Android APK files, is susceptible to a file manipulation vulnerability in versions 2.9.1 and earlier. The tool infers output paths for resource files based on their names, leading to a scenario where an attacker could manipulate these names to write or overwrite files in directories where the user has write access. This vulnerability is particularly relevant if the user name is known or if current working directories are within the user's folder. Remediation has been implemented in the latest commits, specifically commit d348c43b24a9de350ff6e5bd610545a10c1fc712, which addresses this issue.

Affected Version(s)

Apktool <= 2.9.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

80% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.