CVE-2024-21633

EUVD-2024-19273
Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
GitHub_MCNA
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
apktoolapktool
𝑥
< 2.9.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apktool
bookworm
2.7.0+dfsg-6+deb12u1
fixed
bullseye
ignored
buster
no-dsa
forky
2.7.0+dfsg-7.1
fixed
sid
2.7.0+dfsg-7.1
fixed
trixie
2.7.0+dfsg-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apktool
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
lunar
ignored
mantic
ignored
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
trusty
ignored
xenial
needs-triage