BlueStacks privilege escalation through VM backdooring
by Loki - Saturday July 27, 2024 at 05:44 PM
#1
BlueStacks is an Android emulator which runs the guest Android system within a virtual machine. 
Because BlueStacks stores virtual machine configuration files in a world-writeable directory and shares them across different OS users, it is possible for an unprivileged user to backdoor an image that would then gain code execution capabilities of a privileged user.

Reproduction

  1. Set up attacker and victim accounts, preferably making attacker unprivileged and victim the administrator
  2. Victim: install the vulnerbale version of BlueStacks
  3. Attacker: modify Nougat32.bstk to give Android access to C drive
  4. Attacker: run the Android system and install a malicious application on it
  5. Victim: run BlueStacks, causing the malicious application to drop payload in your startup directory
  6. Victim: reboot the machine and log into your account again
  7. Startup payload should be executed with your privileges

Hidden Content
You must register or login to view this content.


Omnicer
[Image: e47c91a87cc521d1efbd20183b42ee4259c9c593.gifv]
PGP
Reply
#2
Thank you bro for this PoC.
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Ivanti/Pulse VPN Client Exploit leading to a privilege escalation Loki 17 1,769 04-07-2025, 03:34 PM
Last Post: ansikkamakola
  Privilege escalation on Windows through a card printer software Loki 1 586 10-22-2024, 07:21 AM
Last Post: jjw53535353
  Laravel Valet 2.0.3 - Local Privilege Escalation macOS luszxis 0 1,152 01-26-2024, 08:25 PM
Last Post: luszxis
  Repost: Nginx Local Privilege Escalation luszxis 0 1,184 01-23-2024, 01:07 AM
Last Post: luszxis

Forum Jump:


 Users browsing this thread: 1 Guest(s)