lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CANJpe11+kRqLz1QCWJ-w0CZ_neS3rgCUnamTqcESPrd4BUyEvw@mail.gmail.com> Date: Sat, 9 Jul 2016 13:12:14 +0300 From: 0x3d5157636b525761 iddqd <0x3d5157636b525761@...il.com> To: fulldisclosure@...lists.org Subject: [FD] RootExplorer remote code execution Disclosure timeline ===================== June 11th: discovered issues. June 12th: contacted App developer. June 12th: App developer replies that the new App is not ready yet, but will not download assets from HTTP. June 13th: asked how much time it'll take to fix, App developer didn't respond. July 2nd: App developer queried again, but failed to respond. July 8th: App developer got his 3rd notice, but failed to respond. July 9th: full disclosure. Technical details ================== RootExplorer is a rooted Android App aimed to ultimately control file operations on an Android device. Unfortunately, RootExplorer tries to download an external busybox from plain a HTTP website, which might cause rooted remote code execution. Blogpost ======= http://securitygodmode.blogspot.com/2016/07/android-attack-surfaces-part-ii.html _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists