Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35205 PoC — Kingsoft Installer of WPS Office 安全漏洞

Source
Associated Vulnerability
Title:Kingsoft Installer of WPS Office 安全漏洞 (CVE-2024-35205)
Description:Kingsoft Installer of WPS Office是中国金山软件(Kingsoft)公司的一个 WPS Office 的安装设置程序。 Kingsoft Installer of WPS Office 17.0.0之前版本存在安全漏洞,该漏洞源于在通过外部应用程序交互处理文件名之前无法正确清理文件名。
Description
Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205
Readme
# Dirty_Stream-Android-POC
This is the exploit for MI-File Explorer V1-210567 version. it writes pwned.txt into "/data/user/0/com.mi.android.globalFileexplorer/shared_prefs" directory

for more information: https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/

https://github.com/user-attachments/assets/1a0b40fa-c4f3-405f-9cc0-0c0b89e2774b

File Snapshot

[4.0K] /data/pocs/bdf0a9ae5258b50f8a3d4dad861bf9d522d6faa9 ├── [4.0K] app │   ├── [1.0K] build.gradle.kts │   ├── [ 750] proguard-rules.pro │   └── [4.0K] src │   ├── [4.0K] androidTest │   │   └── [4.0K] java │   │   └── [4.0K] com │   │   └── [4.0K] fileexplorer │   │   └── [4.0K] exploit │   │   └── [ 762] ExampleInstrumentedTest.java │   ├── [4.0K] main │   │   ├── [1.2K] AndroidManifest.xml │   │   ├── [4.0K] assets │   │   │   └── [ 199] pwned.txt │   │   ├── [4.0K] java │   │   │   └── [4.0K] com │   │   │   └── [4.0K] fileexplorer │   │   │   └── [4.0K] exploit │   │   │   ├── [1.2K] DatabaseHelper.java │   │   │   ├── [2.2K] MainActivity.java │   │   │   └── [1.6K] MyContentProvider.java │   │   └── [4.0K] res │   │   ├── [4.0K] drawable │   │   │   ├── [5.5K] ic_launcher_background.xml │   │   │   └── [1.7K] ic_launcher_foreground.xml │   │   ├── [4.0K] layout │   │   │   └── [1.1K] activity_main.xml │   │   ├── [4.0K] mipmap-anydpi │   │   │   ├── [ 343] ic_launcher_round.xml │   │   │   └── [ 343] ic_launcher.xml │   │   ├── [4.0K] mipmap-hdpi │   │   │   ├── [2.8K] ic_launcher_round.webp │   │   │   └── [1.4K] ic_launcher.webp │   │   ├── [4.0K] mipmap-mdpi │   │   │   ├── [1.7K] ic_launcher_round.webp │   │   │   └── [ 982] ic_launcher.webp │   │   ├── [4.0K] mipmap-xhdpi │   │   │   ├── [3.8K] ic_launcher_round.webp │   │   │   └── [1.9K] ic_launcher.webp │   │   ├── [4.0K] mipmap-xxhdpi │   │   │   ├── [5.8K] ic_launcher_round.webp │   │   │   └── [2.8K] ic_launcher.webp │   │   ├── [4.0K] mipmap-xxxhdpi │   │   │   ├── [7.6K] ic_launcher_round.webp │   │   │   └── [3.8K] ic_launcher.webp │   │   ├── [4.0K] raw │   │   │   └── [ 399] pwned.txt │   │   ├── [4.0K] values │   │   │   ├── [ 147] colors.xml │   │   │   ├── [ 75] strings.xml │   │   │   └── [ 411] themes.xml │   │   ├── [4.0K] values-night │   │   │   └── [ 333] themes.xml │   │   └── [4.0K] xml │   │   ├── [ 478] backup_rules.xml │   │   └── [ 551] data_extraction_rules.xml │   └── [4.0K] test │   └── [4.0K] java │   └── [4.0K] com │   └── [4.0K] fileexplorer │   └── [4.0K] exploit │   └── [ 385] ExampleUnitTest.java ├── [ 167] build.gradle.kts ├── [ 20M] com.mi.android.globalFileexplorer_V1-210567-{DirtyStreamAttack-Test}.apk ├── [4.0K] gradle │   ├── [ 939] libs.versions.toml │   └── [4.0K] wrapper │   ├── [ 58K] gradle-wrapper.jar │   └── [ 230] gradle-wrapper.properties ├── [1.2K] gradle.properties ├── [5.6K] gradlew ├── [2.6K] gradlew.bat ├── [ 34K] LICENSE ├── [ 441] README.md └── [ 538] settings.gradle.kts 33 directories, 42 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.