Skip to content

Commit d3deccb

Browse files
committed
Merge pull request #86 from Fuzion24/feature/enable_weaksauce
Feature/enable weaksauce
2 parents 595f8c0 + 734a6c1 commit d3deccb

File tree

3 files changed

+30
-4
lines changed

3 files changed

+30
-4
lines changed

app/src/main/assets/vuln_map.json

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,25 @@
1717
"cvssv2": 4.9,
1818
"cvedate": "08/05/2015"
1919
},
20+
"WeakSauce": {
21+
"cve": "WeakSauce",
22+
"altnames": [
23+
"WeakSauce"
24+
],
25+
"description": "HTC devices have a poorly written device management agent which has been continually exploited for privledge escalation purposes",
26+
"impact": "Local privilege escalation to root from an unprivileged app",
27+
"external_links": [
28+
"http://newandroidbook.com/Articles/HTC.html",
29+
"https://plus.google.com/+JustinCaseAndroid/posts/515qRPK7c7D",
30+
"https://plus.google.com/+JustinCaseAndroid/posts/GhTCJpr5HcT",
31+
"http://forum.xda-developers.com/showthread.php?t=2699089",
32+
"http://gsec.hitb.org/materials/sg2015/D2%20-%20Ryan%20Welton%20and%20Marco%20Grassi%20-%20Current%20State%20of%20Android%20Privilege%20Escalation.pdf"
33+
],
34+
"patch": [
35+
],
36+
"cvssv2": 4.9,
37+
"cvedate": "11/25/2015"
38+
},
2039
"CVE-2014-4943": {
2140
"cve": "CVE-2014-4943",
2241
"altnames": [

app/src/main/java/fuzion24/device/vulnerability/vulnerabilities/VulnerabilityOrganizer.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@
2525
import fuzion24.device.vulnerability.vulnerabilities.kernel.CVE_2015_3636;
2626
import fuzion24.device.vulnerability.vulnerabilities.system.CVE20151528;
2727
import fuzion24.device.vulnerability.vulnerabilities.system.SamsungCREDzip;
28+
import fuzion24.device.vulnerability.vulnerabilities.system.WeakSauce;
2829

2930
public class VulnerabilityOrganizer {
3031

@@ -42,7 +43,7 @@ public static List<VulnerabilityTest> getTests(Context ctx){
4243
allTests.add(new CVE_2014_3153());
4344
allTests.add(new CVE_2014_4943());
4445
//tests.add(new StumpRoot());
45-
//tests.add(new WeakSauce());
46+
allTests.add(new WeakSauce());
4647
allTests.add(new GraphicBufferTest());
4748
allTests.addAll(StageFright.getTests(ctx));
4849
allTests.add(new CVE_2015_6602());

app/src/main/java/fuzion24/device/vulnerability/vulnerabilities/system/WeakSauce.java

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33

44
import android.content.Context;
55
import android.content.pm.PackageManager;
6+
import android.os.Build;
67

78
import fuzion24.device.vulnerability.util.CPUArch;
89
import fuzion24.device.vulnerability.vulnerabilities.VulnerabilityTest;
@@ -12,14 +13,15 @@
1213
import java.util.List;
1314

1415
public class WeakSauce implements VulnerabilityTest {
15-
16-
1716
@Override
1817
public List<CPUArch> getSupportedArchitectures() {
1918
ArrayList<CPUArch> archs = new ArrayList<CPUArch>();
2019
archs.add(CPUArch.ALL);
2120
return archs;
2221
}
22+
private boolean isHTCPhone(){
23+
return Build.MANUFACTURER.equalsIgnoreCase("htc");
24+
}
2325

2426

2527
@Override
@@ -37,10 +39,14 @@ private boolean thisHasInternetPermission(Context ctx)
3739
@Override
3840
public boolean isVulnerable(Context context) throws Exception {
3941

42+
if(!isHTCPhone()){
43+
return false;
44+
}
45+
4046
if(!thisHasInternetPermission(context))
4147
throw new Exception("No internet permission assigned to app to perform WeakSauce Test");
4248

4349
File dmAgentSocket = new File("/dev/socket/dmagent");
44-
return dmAgentSocket.canWrite() && dmAgentSocket.canRead();
50+
return dmAgentSocket.exists();
4551
}
4652
}

0 commit comments

Comments
 (0)