Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wg7x-9f3g-8524

Опубликовано: 09 апр. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.4
CVSS3: 7.3

Описание

ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.

ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.

EPSS

Процентиль: 2%
0.00012
Низкий

8.4 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.3
nvd
4 дня назад

ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.

EPSS

Процентиль: 2%
0.00012
Низкий

8.4 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-22