Tweak description.
This commit is contained in:
@@ -27,20 +27,22 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Android < 4.2 WebView addJavascriptInterface MITM Code Execution',
|
||||
'Name' => 'Android < 4.2 Browser/WebView addJavascriptInterface Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits an issue where MITM attackers can execute
|
||||
arbitrary code on vulnerable Android devices. The issue is rooted in
|
||||
the use of the addJavascriptInterface function, which exposes Java
|
||||
Reflection to Javascript executing within a WebView instance. Many
|
||||
Android ad network integrations are known to be affected.
|
||||
This module exploits a privilege escalation issue that arises when untrusted
|
||||
Javascript code is executed by an Android WebView component that has one or more
|
||||
Interfaces added to it. The untrusted Javascript code can call into the Java Reflection
|
||||
APIs exposed by the Interface and execute arbitrary commands.
|
||||
|
||||
To use this module, the attacker must have some way to inject the html/js
|
||||
served by metasploit into an affected Webview on the target device. There
|
||||
are a number of ways to do this (DNS spoofing, rogue HTTP proxy, XSS injection, etc).
|
||||
Some distributions of the Android Browser app have an addJavascriptInterface
|
||||
call tacked on, and thus are vulnerable to RCE. The Browser app in the Google APIs
|
||||
4.1.2 release of Android is known to work.
|
||||
|
||||
This module can also get a shell on some versions of the Browser app on
|
||||
Android < 4.2, where the vendor has added an addJavascriptInterface wrapper.
|
||||
A secondary attack vector involves the WebViews embedded inside a large number
|
||||
of Android applications. Ad integrations are perhaps the worst offender here.
|
||||
If you can MITM the WebView's network connection, or can get a persistent XSS
|
||||
into the page displayed in the WebView, then you can inject the html/js served
|
||||
by this module and get a shell.
|
||||
|
||||
Note: Adding a .js to the URL will return plain javascript (no HTML markup).
|
||||
},
|
||||
|
||||
Reference in New Issue
Block a user