CVE-2024-33469

7.9 HIGH

📋 TL;DR

This vulnerability allows a local attacker to execute arbitrary code through the onCreate method in DatabaseViewerActivity.java in Amaze File Manager. It affects users running versions 3.8.5 through 3.9.x of the application. The attacker must have local access to the device where the vulnerable app is installed.

💻 Affected Systems

Products:
  • Team Amaze Amaze File Manager
Versions: v3.8.5 through v3.9.x
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability is in the app itself, not dependent on specific device configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with attacker gaining full control, data theft, and persistence through malicious code execution.

🟠

Likely Case

Local privilege escalation allowing attacker to access sensitive files, install malware, or modify system settings.

🟢

If Mitigated

Limited impact if app runs with minimal permissions and device has strong security controls.

🌐 Internet-Facing: LOW - This requires local access to the device, not remote exploitation.
🏢 Internal Only: HIGH - Local attackers on shared or compromised devices can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the vulnerability. The attacker needs to trigger the vulnerable activity with crafted input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.10 and later

Vendor Advisory: https://github.com/TeamAmaze/AmazeFileManager/releases/tag/v3.10.0

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for Amaze File Manager 3. Check if update to v3.10+ is available 4. Tap Update 5. Alternatively, download v3.10+ from GitHub releases and install manually

🔧 Temporary Workarounds

Disable or restrict app usage

Android

Temporarily disable Amaze File Manager or restrict its usage until patched

adb shell pm disable com.amaze.filemanager
adb shell pm hide com.amaze.filemanager

🧯 If You Can't Patch

  • Uninstall Amaze File Manager completely from affected devices
  • Use alternative file manager applications that are not vulnerable

🔍 How to Verify

Check if Vulnerable:

Check app version in Settings > Apps > Amaze File Manager > App info. If version is between 3.8.5 and 3.9.x, it's vulnerable.

Check Version:

adb shell dumpsys package com.amaze.filemanager | grep versionName

Verify Fix Applied:

Verify app version is 3.10 or higher after update. Check that DatabaseViewerActivity functions normally without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual activity in DatabaseViewerActivity
  • Crash reports from Amaze File Manager
  • Unexpected process execution from the app context

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

app.name:"Amaze File Manager" AND (version:"3.8.5" OR version:"3.9*")

🔗 References

📤 Share & Export