POC详情: 322d955e61ddb807d9691cfafecb5cff0adfdad6

来源
关联漏洞
标题: Google Android Mediatek Command Queue driver 缓冲区错误漏洞 (CVE-2020-0069)
描述:Android是美国谷歌(Google)和开放手持设备联盟(简称OHA)的一套以Linux为基础的开源操作系统。Mediatek Command Queue driver是其中的一个命令队列驱动程序。 Android中的Mediatek Command Queue driver存在缓冲区错误漏洞。攻击者可利用该漏洞提升权限。
描述
Root your MediaTek device with CVE-2020-0069
介绍
# AutomatedRoot
![GitHub](https://img.shields.io/github/license/R0rt1z2/AutomatedRoot)
![GitHub release (latest by date including pre-releases)](https://img.shields.io/github/v/release/R0rt1z2/AutomatedRoot?include_prereleases)
![GitHub All Releases](https://img.shields.io/github/downloads/R0rt1z2/AutomatedRoot/total)
[![GitHub Maintained](https://img.shields.io/badge/maintained-yes-purple.svg)](https://github.com/R0rt1z2/AutomatedRoot)
![GitHub Issues](https://img.shields.io/bitbucket/issues-raw/R0rt1z2/AutomatedRoot?color=red)
![Github Contributors](https://img.shields.io/github/contributors/R0rt1z2/AutomatedRoot)

Root MediaTek devices using `mtk-su` exploit (**CVE-2020-0069**).

## Requirements
* Python 3.9 or newer(in %PATH% for Windows).
* ADB (in %PATH% for Windows).
* The **CVE-2020-0069** PoC (`mtk-su`).

## Usage
* Download the mtk-su binaries from the [MediaTek's SU XDA page](https://forum.xda-developers.com/t/amazing-temp-root-for-mediatek-armv8-2020-08-24.3922213/) and move them to their corresponding folders (`automated_root/files/arm[64]`).
* Download the [latest release of the tool](https://github.com/R0rt1z2/AutomatedRoot/releases).
* If you're using Windows, open a PowerShell. If you're using Linux open a Terminal.
* Install the requirements with `pip3 install -r requirements.txt`.
* Run the script with Python: `python3 mtk-su.py`.

## Available options
1. Root the device. (system-mode + SuperSU).
2. Root the device. (bootless-mode + Magisk).
3. Unroot the device. (supports both bootless and system mode).

## License
* This tool is licensed under the GNU (v3) General Public License. See `LICENSE` for more details.
* `files/common/Initd.apk` is property of RYO Software.
* `files/common/Magisk.apk` and `files/arm[64]/magiskinit` are property of topjohnwu.
* `files/common/SuperSU.apk` and `files/arm[64]/{libsupol.so,su,supolicy}` are property of Chainfire.

## Special thanks
* diplomatic (XDA): the creator of the `mtk-su` (CVE-2020-0069) exploit and the `magisk-boot.sh` script.
* RYO Software: the creator of the Init.d Support App.
* Chainfire: the creator of SuperSU (and its binaries).
* topjohnwu: the creator of Magisk (and its binaries).
文件快照

[4.0K] /data/pocs/322d955e61ddb807d9691cfafecb5cff0adfdad6 ├── [4.0K] automated_root │   ├── [4.0K] files │   │   ├── [4.0K] arm │   │   │   ├── [198K] libsupol.so │   │   │   ├── [373K] magiskinit │   │   │   ├── [ 74K] su │   │   │   └── [ 41K] supolicy │   │   ├── [4.0K] arm64 │   │   │   ├── [327K] libsupol.so │   │   │   ├── [393K] magiskinit │   │   │   ├── [106K] su │   │   │   └── [ 42K] supolicy │   │   └── [4.0K] common │   │   ├── [2.8M] Initd.apk │   │   ├── [3.0M] Magisk.apk │   │   ├── [3.4K] magisk-boot.sh │   │   ├── [ 782] magisk-root.sh │   │   ├── [2.2K] root.sh │   │   ├── [6.1M] SuperSU.apk │   │   └── [1.8K] unroot.sh │   ├── [ 5] __init__.py │   └── [4.0K] utils │   ├── [1.6K] config.py │   ├── [3.2K] device.py │   ├── [ 5] __init__.py │   ├── [ 392] logger.py │   ├── [4.9K] mtksu.py │   └── [ 758] switch.py ├── [ 35K] LICENSE ├── [ 896] mtk-su.py ├── [2.1K] README.md └── [ 15] requirements.txt 6 directories, 26 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。