Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0022 PoC — Android 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Android 缓冲区错误漏洞 (CVE-2020-0022)
Description:In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
Description
This is a RCE bluetooth vulnerability on Android 8.0 and 9.0
Readme
# Bluefrag_CVE-2020-0022
This is a RCE bluetooth vulnerability on Android 8.0 and 9.0

The test python scripts in the folder cve-2020-0022 are from https://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/.
The original download hyperlink is https://insinuator.net/wp-content/uploads/2020/04/cve_2020_0022_export.tar-1.gz


Other crash script refers to https://cloud.tencent.com/developer/article/1590513 and https://github.com/leommxj/cve-2020-0022


Dive into the analysis and exploitation of BlueFrag CVE-2020-0022 for Android 8.0 and 9.0. 

At the end of April 2020, insinuator posted their new research blog about a Bluetooth RCE vulnerability CVE-2020-0022 on Android 8.0 and 9.0. The author gave a detailed analysis and some details about how to exploit, as well as test python scripts. Regarding the exploit, the author didn’t reveal the ROP chain in his post, just left the reader to finish it alone. In this post, I provide a dive into the analysis of this bug, and detail the exploitation by step-by-step debugging. In the end, I implemented the full ROP chain with 5 ROP gadgets by myself to complete the full exploit. The demo video is attached. 

NOTE: The full exploitation script will be released soon. 

Here is the demo video "BlueFrag: CVE-2020-0022 RCE Exploit For Android 8.0 - 9.0" https://www.youtube.com/watch?v=o-rNRBqx7_k

File Snapshot

[4.0K] /data/pocs/b34f00363017480e0c035977f0eb6b1fd4121062 ├── [4.0K] cve_2020_0022 │   ├── [ 17K] exploit.py │   ├── [4.9K] fancy_leak.py │   ├── [2.1K] memcpy.py │   ├── [ 139] readme.txt │   ├── [1.8K] simple_crash.py │   └── [2.0K] simple_leak.py ├── [ 24M] cve-2020-0022_exploit_by_k3vinlusec.mp4 ├── [4.1K] poc.c └── [1.4K] README.md 1 directory, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →