[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CANJpe11+kRqLz1QCWJ-w0CZ_neS3rgCUnamTqcESPrd4BUyEvw@mail.gmail.com>
Date: Sat, 9 Jul 2016 13:12:14 +0300
From: 0x3d5157636b525761 iddqd <0x3d5157636b525761@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] RootExplorer remote code execution
Disclosure timeline
=====================
June 11th: discovered issues.
June 12th: contacted App developer.
June 12th: App developer replies that the new App is not ready yet, but
will not download assets from HTTP.
June 13th: asked how much time it'll take to fix, App developer didn't
respond.
July 2nd: App developer queried again, but failed to respond.
July 8th: App developer got his 3rd notice, but failed to respond.
July 9th: full disclosure.
Technical details
==================
RootExplorer is a rooted Android App aimed to ultimately control file
operations on an Android device.
Unfortunately, RootExplorer tries to download an external busybox from
plain a HTTP website, which might cause rooted remote code execution.
Blogpost
=======
http://securitygodmode.blogspot.com/2016/07/android-attack-surfaces-part-ii.html
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists