THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-32653

Insufficient input filtering of "package name" allows command execution in the device with shell privileges

AssignerGitHub_M
Reserved2024-04-16
Published2024-04-22
Updated2024-06-06

Description

jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability.



MEDIUM: 6.1CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H

Problem types

CWE-20: Improper Input Validation

Product status

< 1.5.0
affected

References

https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm

https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109

https://github.com/skylot/jadx/releases/tag/v1.5.0

cve.org CVE-2024-32653

nvd.nist.gov CVE-2024-32653

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-32653
© Copyright 2024 THREATINT. Made in Cyprus with +