POC详情: 1fada3c290262c5871cdb2ea0fe40c8ceee417c8

来源
关联漏洞
标题: Google Android 安全漏洞 (CVE-2024-0044)
描述:Google Android是美国谷歌(Google)公司的一套以Linux为基础的开源操作系统。 Google Android 存在安全漏洞,该漏洞源于 PackageInstallerService.java 文件的 createSessionInternal 方法存在输入验证不当,可能会以任何应用程序的方式运行。
描述
a vulnerability affecting Android version 12 & 13
介绍
# CVE-2024-0044

## Overview

**CVE-2024-0044** is a vulnerability discovered in certain Android applications that allows attackers to escalate privileges by exploiting a flaw in the `run-as` command. This vulnerability can be exploited by crafting a specific payload that grants unauthorized access to application data directories, which should otherwise be inaccessible to the attacker.


## Overview

This Bash script automates the exploitation of CVE-2024-0044 by pushing a malicious APK to the target device, extracting the necessary UID, generating a payload, and guiding the user through executing the required commands in an `adb` shell.

### Features

- **APK Push**: The script pushes a specified APK to the target device.
- **UID Extraction**: It extracts the UID of the target application.
- **Payload Generation**: Generates a payload designed to exploit the vulnerability.
- **Interactive Execution**: Prompts the user for input at key steps to guide them through the exploitation process.


### Prerequisites

- **ADB (Android Debug Bridge)**: Ensure that `adb` is installed and properly configured on your system.
- **Rooted Android Device**: The target device must be rooted to allow access to the `/data/local/tmp` directory and execution of the `run-as` command.

### Execution

1. **Save the Script**: Save the Bash script as `exploit_cve_2024_0044.sh`.
2. **Make the Script Executable**: Run the following command to make the script executable:
    ```bash
    chmod +x exploit_cve_2024_0044.sh
    ```
3. Usage:
    ```bash
    ./exploit_cve_2024_0044.sh -P <package_name> -A <apk_file_path>
    ```
   - **-P**: The package name of the target application.
   - **-A**: The path to the malicious APK file.
文件快照

[4.0K] /data/pocs/1fada3c290262c5871cdb2ea0fe40c8ceee417c8 ├── [4.5K] exploit.sh └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。