First published: Sun Jun 25 2023(Updated: )
Directory traversal can occur in the Basecamp com.basecamp.bc3 application before 4.2.1 for Android, which may allow an attacker to write arbitrary files in the application's private directory. Additionally, by using a malicious intent, the attacker may redirect the server's responses (containing sensitive information) to third-party applications by using a custom-crafted deeplink scheme.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Basecamp | <4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36612 is categorized as a high severity vulnerability due to the potential for arbitrary file writing in the application's private directory.
To mitigate CVE-2023-36612, update the Basecamp app to version 4.2.1 or later on Android devices.
CVE-2023-36612 allows attackers to exploit directory traversal to write arbitrary files, compromising app integrity and user data.
CVE-2023-36612 affects Basecamp versions before 4.2.1 for Android.
CVE-2023-36612 does not directly lead to remote code execution but allows for unauthorized file manipulation, which can lead to further attacks.