Directory traversal vulnerability in the WifiHs20UtilityService on the Samsung S6 Edge LRX22G.G925VVRU1AOE2 allows remote attackers to overwrite or create arbitrary files as the system-level user via a .. (dot dot) in the name of a file, compressed into a zipped file named cred.zip, and downloaded to /sdcard/Download.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/77338 | third party advisory vdb entry |
http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html | third party advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=489&q=samsung&redir=1 | third party advisory issue tracking |