发布时间 :2014-03-31 10:58:57
修订时间 :2014-03-31 15:08:03

[原文]The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.

[CNNVD]Chainfire SuperSU 任意命令执行漏洞(CNNVD-201311-224)

        Chainfire SuperSU是一套安卓手机超级用户授权工具。该工具通过授予应用程序root权限,可掌握手机的控制权。
        Chainfire SuperSU 1.69之前的版本中存在任意命令执行漏洞。攻击者可利用该漏洞以root权限执行任意命令,可完全控制应用程序和底层设备。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20131113 Android Superuser shell character escape vulnerability

- 漏洞信息

Chainfire SuperSU 任意命令执行漏洞
2013-11-21 00:00:00 2013-11-21 00:00:00
        Chainfire SuperSU是一套安卓手机超级用户授权工具。该工具通过授予应用程序root权限,可掌握手机的控制权。
        Chainfire SuperSU 1.69之前的版本中存在任意命令执行漏洞。攻击者可利用该漏洞以root权限执行任意命令,可完全控制应用程序和底层设备。

- 公告与补丁


- 漏洞信息

Chainfire SuperSU for Android Command Injection Local Privilege Escalation Weakness
Local Access Required Input Manipulation
Loss of Integrity Upgrade
Exploit Public Coordinated Disclosure

- 漏洞描述

Chainfire SuperSU for Android contains a flaw that leads to unauthorized privileges being gained. The issue is due to the to get_command() returning COMMAND unescaped, which may allow a local attacker to inject arbitrary commands. This will allow the attacker to more easily gain elevated privileges.

- 时间线

2013-11-11 Unknow
2013-11-13 Unknow

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 1.69, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Chainfire SuperSU CVE-2013-6775 Arbitrary Command Execution Vulnerability
Design Error 63715
Yes No
2013-11-13 12:00:00 2013-11-13 12:00:00
Kevin Cernekee

- 受影响的程序版本

- 漏洞讨论

Chainfire SuperSU is prone to an arbitrary command-execution vulnerability.

An attacker can leverage this issue to execute arbitrary commands with root privileges. Successful exploits will compromise the application and possibly the underlying device.

Chainfire SuperSU is vulnerable; other versions may also be affected.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 解决方案

Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 相关参考