Monorail Project: project-zero Issues People Development process History Sign in
New issue
Advanced search Search tips
Starred by 9 users
Status: Fixed
Owner:
Closed: Oct 2015
Cc:



Sign in to add a comment
Samsung WifiHs20UtilityService path traversal
Project Member Reported by hawkes@google.com, Jul 29 2015 Back to list
A path traversal vulnerability was found in the WifiHs20UtilityService. This service is running on a Samsung S6 Edge device, and may be present on other Samsung device models.

WifiHs20UtilityService reads any files placed in /sdcard/Download/cred.zip,
and unzips this file into /data/bundle. Directory traversal  in the path of the zipped contents allows an attacker to write a controlled file to an arbitrary path as the system user. 

We have triggered this issue via automatic downloads in Chrome, i.e. the file write vulnerability can be triggered by browsing to a website without any user interaction (a drive by attack model).

This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. 

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
Project Member Comment 1 by scvitti@google.com, Jul 30 2015
Labels: -Reported-2015-July-29 Reported-2015-Jul-29
Project Member Comment 2 by natashenka@google.com, Oct 22 2015
Status: Fixed
Project Member Comment 3 by natashenka@google.com, Oct 23 2015
Labels: CVE-2015-7888
Project Member Comment 4 by natashenka@google.com, Oct 27 2015
Labels: -Restrict-View-Commit
Fixed in October MR.
Comment 5 by s1l...@gmail.com, Oct 29 2015
where is facepalm smile ? )
Sign in to add a comment