File tree Expand file tree Collapse file tree 3 files changed +30
-4
lines changed
java/fuzion24/device/vulnerability/vulnerabilities Expand file tree Collapse file tree 3 files changed +30
-4
lines changed Original file line number Diff line number Diff line change 17
17
"cvssv2" : 4.9 ,
18
18
"cvedate" : " 08/05/2015"
19
19
},
20
+ "WeakSauce" : {
21
+ "cve" : " WeakSauce" ,
22
+ "altnames" : [
23
+ " WeakSauce"
24
+ ],
25
+ "description" : " HTC devices have a poorly written device management agent which has been continually exploited for privledge escalation purposes" ,
26
+ "impact" : " Local privilege escalation to root from an unprivileged app" ,
27
+ "external_links" : [
28
+ " http://newandroidbook.com/Articles/HTC.html" ,
29
+ " https://plus.google.com/+JustinCaseAndroid/posts/515qRPK7c7D" ,
30
+ " https://plus.google.com/+JustinCaseAndroid/posts/GhTCJpr5HcT" ,
31
+ " http://forum.xda-developers.com/showthread.php?t=2699089" ,
32
+ " http://gsec.hitb.org/materials/sg2015/D2%20-%20Ryan%20Welton%20and%20Marco%20Grassi%20-%20Current%20State%20of%20Android%20Privilege%20Escalation.pdf"
33
+ ],
34
+ "patch" : [
35
+ ],
36
+ "cvssv2" : 4.9 ,
37
+ "cvedate" : " 11/25/2015"
38
+ },
20
39
"CVE-2014-4943" : {
21
40
"cve" : " CVE-2014-4943" ,
22
41
"altnames" : [
Original file line number Diff line number Diff line change 25
25
import fuzion24 .device .vulnerability .vulnerabilities .kernel .CVE_2015_3636 ;
26
26
import fuzion24 .device .vulnerability .vulnerabilities .system .CVE20151528 ;
27
27
import fuzion24 .device .vulnerability .vulnerabilities .system .SamsungCREDzip ;
28
+ import fuzion24 .device .vulnerability .vulnerabilities .system .WeakSauce ;
28
29
29
30
public class VulnerabilityOrganizer {
30
31
@@ -42,7 +43,7 @@ public static List<VulnerabilityTest> getTests(Context ctx){
42
43
allTests .add (new CVE_2014_3153 ());
43
44
allTests .add (new CVE_2014_4943 ());
44
45
//tests.add(new StumpRoot());
45
- //tests .add(new WeakSauce());
46
+ allTests .add (new WeakSauce ());
46
47
allTests .add (new GraphicBufferTest ());
47
48
allTests .addAll (StageFright .getTests (ctx ));
48
49
allTests .add (new CVE_2015_6602 ());
Original file line number Diff line number Diff line change 3
3
4
4
import android .content .Context ;
5
5
import android .content .pm .PackageManager ;
6
+ import android .os .Build ;
6
7
7
8
import fuzion24 .device .vulnerability .util .CPUArch ;
8
9
import fuzion24 .device .vulnerability .vulnerabilities .VulnerabilityTest ;
12
13
import java .util .List ;
13
14
14
15
public class WeakSauce implements VulnerabilityTest {
15
-
16
-
17
16
@ Override
18
17
public List <CPUArch > getSupportedArchitectures () {
19
18
ArrayList <CPUArch > archs = new ArrayList <CPUArch >();
20
19
archs .add (CPUArch .ALL );
21
20
return archs ;
22
21
}
22
+ private boolean isHTCPhone (){
23
+ return Build .MANUFACTURER .equalsIgnoreCase ("htc" );
24
+ }
23
25
24
26
25
27
@ Override
@@ -37,10 +39,14 @@ private boolean thisHasInternetPermission(Context ctx)
37
39
@ Override
38
40
public boolean isVulnerable (Context context ) throws Exception {
39
41
42
+ if (!isHTCPhone ()){
43
+ return false ;
44
+ }
45
+
40
46
if (!thisHasInternetPermission (context ))
41
47
throw new Exception ("No internet permission assigned to app to perform WeakSauce Test" );
42
48
43
49
File dmAgentSocket = new File ("/dev/socket/dmagent" );
44
- return dmAgentSocket .canWrite () && dmAgentSocket . canRead ();
50
+ return dmAgentSocket .exists ();
45
51
}
46
52
}
You can’t perform that action at this time.
0 commit comments