CVE-2024-21633

HIGH
2024-01-03 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 19:33 vuln.today
Patch Released
Mar 28, 2026 - 19:33 nvd
Patch available
PoC Detected
Nov 21, 2024 - 08:54 vuln.today
Public exploit code
CVE Published
Jan 03, 2024 - 17:15 nvd
HIGH 7.8

Description

Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.

Analysis

Apktool versions 2.9.1 and prior contain a path traversal vulnerability when processing Android APK files. Malicious APK resources with crafted filenames can write files to arbitrary locations on the system, enabling code execution on developer and CI/CD machines that analyze untrusted APKs.

Technical Context

Apktool processes Android APK files by extracting and decompiling resources. Resource filenames from the APK's resource table are used to create output paths without proper sanitization. A malicious APK can include resources with path traversal sequences (e.g., ../../.bashrc) that write files outside the intended output directory when decompiled.

Affected Products

['Apktool <= 2.9.1']

Remediation

Update to Apktool 2.9.2 or later. Run APK analysis in sandboxed environments (containers, VMs). Never decompile untrusted APKs on production machines. Review output directories after Apktool runs for files outside the expected project structure.

Priority Score

140
Low Medium High Critical
KEV: 0
EPSS: +80.5
CVSS: +39
POC: +20

Share

CVE-2024-21633 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy