android-rooting-tools / android_run_root_shell

569 stars 269 forks source link

New exploit posted on xda for Sony #19

Closed Androxyde closed 10 years ago

Androxyde commented 10 years ago

get sources here : https://www.dropbox.com/s/7bwrd6kznp31lfi/rootkit.zip

I modded original code as follow ;

The tool reads addresses from a text file (one included for LT26 in zip bundle). By looking code, you will see how those addresses are affected to variables and what it means ;-)

Regards, Androxyde

fi01 commented 10 years ago

It is CVE-2013-6282 exploit. It is based on my code. https://gist.github.com/fi01/7500988 It doesn't work on secure devices they are restricted to use ptrace().

To use this exploit, I find we can use pipe_ioctl(). It seems that it works on all devices they have CVE-2013-6282 vulnerability. It is already added as libput_user_exploit.

Androxyde commented 10 years ago

great :-)

is it possible anyway, instead of maintaining a device database as struct, to have exploit variable parameters in a file, that way, no need to rebuild the toolkit for every new device ? that would be really nice