Apktool Vulnerability Allows Attackers to Write Files to Desired Locations on User's System
CVE-2024-21633
Key Information:
- Vendor
Ibotpeaches
- Status
- Vendor
- CVE Published:
- 3 January 2024
Badges
What is CVE-2024-21633?
Apktool, a widely used tool for reverse engineering Android APK files, is susceptible to a file manipulation vulnerability in versions 2.9.1 and earlier. The tool infers output paths for resource files based on their names, leading to a scenario where an attacker could manipulate these names to write or overwrite files in directories where the user has write access. This vulnerability is particularly relevant if the user name is known or if current working directories are within the user's folder. Remediation has been implemented in the latest commits, specifically commit d348c43b24a9de350ff6e5bd610545a10c1fc712, which addresses this issue.
Affected Version(s)
Apktool <= 2.9.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
80% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
