CVE-2024-32653

jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability.
Configurations

No configuration.

History

21 Nov 2024, 09:15

Type Values Removed Values Added
References () https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109 - () https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109 -
References () https://github.com/skylot/jadx/releases/tag/v1.5.0 - () https://github.com/skylot/jadx/releases/tag/v1.5.0 -
References () https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm - () https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm -

23 Apr 2024, 12:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-22 23:15

Updated : 2024-11-21 09:15


NVD link : CVE-2024-32653

Mitre link : CVE-2024-32653

CVE.ORG link : CVE-2024-32653


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation