Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-31319 PoC — Google Android 安全漏洞

Source
Associated Vulnerability
Title:Google Android 安全漏洞 (CVE-2024-31319)
Description:Google Android是美国谷歌(Google)公司的一套以Linux为基础的开源操作系统。 Google Android 存在安全漏洞,该漏洞源于 NotificationManagerService.java 文件的 updateNotificationChannelFromPrivilegedListener 方法存在代理混淆,可能存在跨用户数据泄露问题。
Readme
### fix-02-failure-CVE-2024-31319-and-CVE-2024-0039

##### 1. Check CVE apply?

    git log --oneline | grep CVE-20xx-xxxx

##### 2. If CVE applied, 

```bash

#### Fix CVE-2024-31319

Decription about CVE: 
- CVE Verify URI permission for channel sound update from NotificationListenerService
-  Check that a privileged NotificationListenerService (CDM) has the permission to access the sound URI
  when updating a notification channel.

Current error analysis:

- Not have URI permission

Solution:

-   Add URI permission

find CVE-2024-31319 by use 

    git log --oneline | grep CVE-2024-31319

result:
9cdc3b62d1f6 [jazz:188709][SPL-06-2024]CVE-2024-31319

use git show 9cdc3b62d1f6 to see apply

and result apply ok of the CVE-2024-31319

so check diff each the special file the newest commit between the commit 9cdc3b62d1f6 by use

    git diff 9cdc3b62d1f6 NotificationManagerService.java 

and resule see the apply be removed (use special module), so check where commit remove the module by use

    git log -S'verifyPrivilegedListenerUriPermission' -- NotificationManagerService.java 

and see 2 commit to change that 8247e4b20a2e94339019e3fb2d9060287527e6e3 and 9cdc3b62d1f6612dfc860403bd1e33d53de3e894


use git show the newest commit and see 8247e4b20a2e94339019e3 (remove apply code) and 9cdc3b62d1f6612dfc86 (apply code)

use git revert 8247e4b20a2e94339019e3 to remove the modify


#### Fix CVE-2024-0039

```



File Snapshot

[4.0K] /data/pocs/3a5283c9c91671ee4d50a0670d5fb06278b5e014 ├── [128K] image.png ├── [251K] Lamresult.pdf └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.