Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-6754 PoC — Android Webview 远程代码执行漏洞

Source
Associated Vulnerability
Title:Android Webview 远程代码执行漏洞 (CVE-2016-6754)
Description:Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。WebView是一个封装在Android SDK(软件开发工具包)中的组件,该组件用于在Android应用中嵌入一个浏览器来进行网页浏览。 Android中的Webview存在远程代码执行漏洞。攻击者可利用该漏洞在受影响的进程上下文中执行任意代码,也可能拒绝服务。以下版本受到影响:Android 5.0.2,5.1.1,6.0,6.0.1。
Description
Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016
Readme
# BadKernel

#full exploit for CVE-2016-6754(BadKernel)
#slide for syscan2016 shanghai "BadKernel --- exploit V8 with a typo"
File Snapshot

[4.0K] /data/pocs/c4ceb8b2170a777c85159a2445212faec66fa27f ├── [1.6M] BadKernel-syscan2016.pdf ├── [ 40K] exploit.html └── [ 126] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.