Sbouamri / Approver

Test repository
0 stars 0 forks source link

[ID: COMMAND_SU] Runtime Critical Command Checking #79

Open Sbouamri opened 5 years ago

Sbouamri commented 5 years ago

The app requests for "root" permission through the command Runtime.getRuntime().exec("su"). This behavior could be used either by a benign app to check its execution environment or by a malicious app to gain all the privileges. REMEDIATION: Please carefully revise the application in order to identify the expected behavior. If unsure, we strongly suggest not to install this app. Vulnerable Code:

api_class Ljava/lang/Runtime;
api_method exec
method startCoreDaemon
string Lorg/csploit/android/core/System;->startCoreDaemon()V ---> Ljava/lang/Runtime;->exec(Ljava/lang/String;)Ljava/lang/Process;
api_type (Ljava/lang/String;)Ljava/lang/Process;
id Ljava/lang/Runtime;->exec(Ljava/lang/String;)Ljava/lang/Process;
type ()V
class Lorg/csploit/android/core/System;
volgk commented 5 years ago

How to prove it?