Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205# Dirty_Stream-Android-POC
This is the exploit for MI-File Explorer V1-210567 version. it writes pwned.txt into "/data/user/0/com.mi.android.globalFileexplorer/shared_prefs" directory
for more information: https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/
https://github.com/user-attachments/assets/1a0b40fa-c4f3-405f-9cc0-0c0b89e2774b
[4.0K] /data/pocs/bdf0a9ae5258b50f8a3d4dad861bf9d522d6faa9
├── [4.0K] app
│ ├── [1.0K] build.gradle.kts
│ ├── [ 750] proguard-rules.pro
│ └── [4.0K] src
│ ├── [4.0K] androidTest
│ │ └── [4.0K] java
│ │ └── [4.0K] com
│ │ └── [4.0K] fileexplorer
│ │ └── [4.0K] exploit
│ │ └── [ 762] ExampleInstrumentedTest.java
│ ├── [4.0K] main
│ │ ├── [1.2K] AndroidManifest.xml
│ │ ├── [4.0K] assets
│ │ │ └── [ 199] pwned.txt
│ │ ├── [4.0K] java
│ │ │ └── [4.0K] com
│ │ │ └── [4.0K] fileexplorer
│ │ │ └── [4.0K] exploit
│ │ │ ├── [1.2K] DatabaseHelper.java
│ │ │ ├── [2.2K] MainActivity.java
│ │ │ └── [1.6K] MyContentProvider.java
│ │ └── [4.0K] res
│ │ ├── [4.0K] drawable
│ │ │ ├── [5.5K] ic_launcher_background.xml
│ │ │ └── [1.7K] ic_launcher_foreground.xml
│ │ ├── [4.0K] layout
│ │ │ └── [1.1K] activity_main.xml
│ │ ├── [4.0K] mipmap-anydpi
│ │ │ ├── [ 343] ic_launcher_round.xml
│ │ │ └── [ 343] ic_launcher.xml
│ │ ├── [4.0K] mipmap-hdpi
│ │ │ ├── [2.8K] ic_launcher_round.webp
│ │ │ └── [1.4K] ic_launcher.webp
│ │ ├── [4.0K] mipmap-mdpi
│ │ │ ├── [1.7K] ic_launcher_round.webp
│ │ │ └── [ 982] ic_launcher.webp
│ │ ├── [4.0K] mipmap-xhdpi
│ │ │ ├── [3.8K] ic_launcher_round.webp
│ │ │ └── [1.9K] ic_launcher.webp
│ │ ├── [4.0K] mipmap-xxhdpi
│ │ │ ├── [5.8K] ic_launcher_round.webp
│ │ │ └── [2.8K] ic_launcher.webp
│ │ ├── [4.0K] mipmap-xxxhdpi
│ │ │ ├── [7.6K] ic_launcher_round.webp
│ │ │ └── [3.8K] ic_launcher.webp
│ │ ├── [4.0K] raw
│ │ │ └── [ 399] pwned.txt
│ │ ├── [4.0K] values
│ │ │ ├── [ 147] colors.xml
│ │ │ ├── [ 75] strings.xml
│ │ │ └── [ 411] themes.xml
│ │ ├── [4.0K] values-night
│ │ │ └── [ 333] themes.xml
│ │ └── [4.0K] xml
│ │ ├── [ 478] backup_rules.xml
│ │ └── [ 551] data_extraction_rules.xml
│ └── [4.0K] test
│ └── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] fileexplorer
│ └── [4.0K] exploit
│ └── [ 385] ExampleUnitTest.java
├── [ 167] build.gradle.kts
├── [ 20M] com.mi.android.globalFileexplorer_V1-210567-{DirtyStreamAttack-Test}.apk
├── [4.0K] gradle
│ ├── [ 939] libs.versions.toml
│ └── [4.0K] wrapper
│ ├── [ 58K] gradle-wrapper.jar
│ └── [ 230] gradle-wrapper.properties
├── [1.2K] gradle.properties
├── [5.6K] gradlew
├── [2.6K] gradlew.bat
├── [ 34K] LICENSE
├── [ 441] README.md
└── [ 538] settings.gradle.kts
33 directories, 42 files