Attackers can exploit this vulnerability by sending malicious upgrade requests via HTTP POST requests. An attacker can send upgrade requests to the following URL and get upgrade responses with the attacker’s signed keys: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id> where malicious key> and malicious bootloader id> are the keys for signing and encrypting the OTA. An attacker can also send malicious upgrade requests via HTTP POST requests to the following URL: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id>&url=URL of target app> where URL of target app> is the URL of an application that is vulnerable to this vulnerability. In the above examples, malicious key> and malicious bootloader id> are the keys for signing and encrypting the OTA. An attacker can also send upgrade requests to the following URL: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id>&url=URL of target app>&appPackage=malicious app package> where URL of target app> is the URL of an application that is vulnerable to

Attackers can exploit this vulnerability by sending upgrade requests to the following URL

Attackers can exploit this vulnerability by sending upgrade requests to the following URL: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id>&url=URL of target app> where URL of target app> is the URL of an application that is vulnerable to this vulnerability. In the above examples, malicious key> and malicious bootloader id> are the keys for signing and encrypting the OTA. An attacker can also send upgrade requests to the following URL: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id>&url=URL of target app>&appPackage=malicious app package> where URL of target app> is the URL of an application that is vulnerable to this vulnerability.

Vulnerability details

On July 29, 2017, a vulnerability was found that allows attackers to upgrade applications without the user's consent. An attacker can exploit this vulnerability by sending malicious upgrade requests via HTTP POST requests to the following URL: /upgrade/?signKey=malicious key>&OTA_Decrypt_Key=malicious key>&bootLoaderId=malicious bootloader id>&url=URL of target app> where URL of target app> is the URL of an application that is vulnerable to this vulnerability.

Timeline

Published on: 11/02/2022 18:15:00 UTC
Last modified on: 11/03/2022 16:41:00 UTC

References