CVE-2024-0044是一项高危漏洞,影响Android 12和13版本,该漏洞位于PackageInstallerService.java文件的createSessionInternal函数中。此漏洞允许攻击者执行"run-as any app"攻击,从而在不需要用户交互的情况下实现本地特权升级。问题出现在createSessionInternal函数中的输入验证不当。攻击者可以通过操纵会话创建过程来利用此漏洞,可能会未经授权地访问敏感数据并在受影响设备上执行未经授权的操作。
该漏洞由Meta Security发现:
7e5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5N6s2S2Q4x3X3g2E0k6i4c8S2i4K6u0W2M7$3g2U0N6i4u0A6N6s2W2Q4x3V1k6W2P5s2m8D9L8$3W2@1j5i4c8A6L8$3&6Q4x3V1j5J5x3o6t1@1i4K6u0r3x3o6y4Q4x3V1j5H3y4q4)9J5c8V1q4F1k6s2u0G2K9h3c8Q4x3X3c8J5N6h3&6Q4x3X3c8S2M7#2)9J5k6r3k6G2M7X3N6W2M7Y4W2Q4x3X3g2Z5N6r3#2D9
Tiny hack总结并分享了概念证明:
659K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6@1K9h3&6&6K9r3q4U0K9#2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3U0c8Q4x3V1j5H3y4W2)9J5c8U0l9%4i4K6u0r3k6i4S2@1M7X3q4U0N6r3W2F1k6#2)9J5k6s2N6Z5j5i4c8K6j5i4m8H3i4K6u0V1k6r3q4@1j5h3u0S2M7$3g2Q4x3X3c8G2M7W2)9J5k6r3q4F1P5g2)9J5k6r3q4H3M7q4)9J5k6r3c8S2N6r3q4Q4x3X3c8X3M7X3!0E0i4K6u0V1j5h3&6V1M7X3!0A6k6q4)9J5k6o6p5J5i4K6u0V1x3e0y4Q4x3X3c8#2M7$3W2F1k6#2)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3U0c8Q4x3X3b7H3x3o6b7@1i4K6u0r3i4K6y4r3M7#2)9K6c8o6l9K6
有关安全补丁的详细信息,请参阅Android 安全公告:
353K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6L8%4g2J5j5$3g2Q4x3X3g2S2L8X3c8J5L8$3W2V1i4K6u0W2j5$3!0E0i4K6u0r3k6r3!0U0M7#2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6i4K6u0r3j5Y4g2D9L8r3g2@1K9h3&6Q4x3V1j5J5x3o6t1@1i4K6u0V1x3o6y4Q4x3X3b7H3x3b7`.`.
参考d34K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6H3L8o6c8A6L8Y4b7K6P5s2c8Q4x3V1k6U0N6X3g2Q4y4h3j5J5x3o6t1@1i4K6g2X3x3o6l9@1y4l9`.`.
目标:提取手机上微信数据。
手机:小米10 HyberOS1.0.5.0TJBCNXM Android13 补丁时间:2024-03-01
1.查看微信uid
[招生]科锐逆向工程师培训(2025年3月11日实地,远程教学同时开班, 第52期)!