← Zuruck zu CVEs
CVE-2026-40027
HIGH7.3
Beschreibung
ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration.
CVE Details
CVSS v3.1 Bewertung7.3
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht4/8/2026
Zuletzt geandert4/8/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-22
Referenzen
https://github.com/abrignoni/ALEAPP/commit/0cafd8fe0027663420eb3d0fa821b2d1a713880d(disclosure@vulncheck.com)
https://github.com/abrignoni/aleapp/pull/669(disclosure@vulncheck.com)
https://mobasi.ai/sentinel(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/aleapp-nq-vault-artifact-parser-path-traversal(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.