POC详情: 6b169fd5f796da75ab8cb8c8cf648e8103aac9d0

来源
关联漏洞
标题: Microvirt MEmu 操作系统命令注入漏洞 (CVE-2019-14514)
描述:Microvirt MEmu是一款Android模拟器。 Microvirt MEmu 7.0.2之前版本中存在操作系统命令注入漏洞。攻击者可借助shell元字符利用该漏洞执行任意命令。
描述
Remote code execution in Microvirt MEmu
介绍
**CVEID**: CVE-2019-14514

**Name of the affected product(s) and version(s)**: Microvirt MEmu (all versions prior to 7.0.2)

**Problem type**: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

---

**Summary**

MEmu is an Android emulator for Windows. During our tests, we have found an open TCP port which could be exploited to gain code execution with root privileges.
All Microvirt MEmu versions prior to 7.0.2 feature a vulnerable binary which listens on port 21509. An attacker could gain remote code execution with root privileges on an emulated Android system by sending crafted messages containing special characters used as command delimiters in Unix shells.
 
**Description**
 
```/system/bin/systemd``` binary (not related to Freedesktop systemd init system) is run by the root user and listens for commands on port 21509. If a command starting with installer:uninstall is sent, attacker-controlled input will be inserted into a shell command template and passed to /system/bin/sh without verification or escaping. This means that a remote attacker could insert special characters like ```;```, ```&&``` or ```||``` to send his own shell commands which will be executed on the emulated system with root privileges.
 
**Reproduction**
 
```echo "installer:uninstall;[shell_command_to_execute]" | nc [emulator_ip] 21509```
 
The emulator should execute the command and then reboot.
 
**Remedy**

Update MEmu to version 7.0.2 or later.
文件快照

[4.0K] /data/pocs/6b169fd5f796da75ab8cb8c8cf648e8103aac9d0 ├── [ 137] exploit.sh ├── [ 143] local_exploit.sh └── [1.5K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。