Description
ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
0cafd8fe0027663420eb3d0fa821b2d1a713880d (git)
Credits
Mobasi Security Team
References
github.com/abrignoni/aleapp/pull/669 (Pull Request)
github.com/...ommit/0cafd8fe0027663420eb3d0fa821b2d1a713880d (Patch Commit)
mobasi.ai/sentinel (Mobasi Sentinel Vulnerability Index)
www.vulncheck.com/...nq-vault-artifact-parser-path-traversal (VulnCheck Advisory: ALEAPP NQ Vault Artifact Parser Path Traversal)