Here We Go Again A Five-Bug Chain to Arbitrary APK Install o...#2201
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
Here We Go Again A Five-Bug Chain to Arbitrary APK Install o...#2201carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://bugscale.ch/blog/here-we-go-again-a-five-bug-chain-to-arbitrary-apk-install-on-samsung-s25/ Content Categories: Based on the analysis, this content was categorized under "Mobile Pentesting -> Android Applications Pentesting (new page or additions under: Exported Components/Broadcast Receivers, Path Traversal/Arbitrary File Write, and Custom APK Signature Verification / Signature Scheme Confusion)". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Scope / threat model
The post documents a 5-bug exploit chain in Samsung Galaxy Store v4.6.02.7 (tested on Samsung S25) that enables a malicious local app (no special permissions) to trigger a silent install of an arbitrary local APK (no user interaction, no install confirmation). The payload APK does not need to be hosted on Galaxy Store (or any store); it only needs to be present lo...
🔧 Technical Details
Deterministic artifact substitution via size-only download validation: If an installer/downloader uses a deterministic on-disk path and treats an existing file as “already downloaded” when
filesize >= expected_size(without verifying hash/signature at the download stage), an attacker who can write to that path can substitute the artifact (e.g., an APK) and force later install stages to consume attacker-controlled content.APK signature-scheme confusion against custom verifiers: If an app implements custom APK signature validation and (1) incorrectly falls back from v3 to v2 when v3 exists but doesn’t match the expected signer, and (2) validates v2 by checking only the signature over the digest present in the signing block (without recomputing/verifying that the APK contents hash to that digest), an attacker can craft a “dual-signed” APK: include an attacker-controlled valid v3 signature (so Android installs it) and graft a trus...
🤖 Agent Actions
I’m analyzing the Samsung Galaxy Store chain, mapping the underlying techniques to existing HackTricks Android content, and then I’ll update the most appropriate single file with only the non-duplicated material.
I have the repo layout. Next I’m narrowing the Android section and checking whether HackTricks already covers the specific primitives from the Galaxy Store chain before choosing a single target file.
The Android section already has material on exported components, content providers, deep links, and APK tooling. I’m reading the core files now to see whether this belongs in a focused page or in the main Android methodology without duplicating existing guidance.
The best fit is looking like
android-applications-basics.md: it already has the component model, broadcast receivers, content providers, deep links, and app-signing concepts in one place, which lets me keep this change in a single file without scattering related techniques.I’ve confirmed the repo does not already document the Samsung-specific primitives. I’m fetching the small set of external references I’ll cite so the added section can stay abstract but still point readers to the exact signing and Shell APK docs.
I’ve got the exact insertion points. I’m editing
android-applications-basics.mdnow to add short, technique-focused subsections under Broadcast Receivers, Content Providers, and Digital Signing, then I’ll update the references block at the end.The edit is in place. I’m re-reading the touched sections now to make sure the content stays concise, lands in the right subsections, and keeps the references block valid at the end of the file.
The file reads cleanly after the patch. I’m doing a final diff and whitespace check now, then I’ll close out the task list and summarize exactly what changed.
Updated android-applications-basics.md as the single target file. I kept it in the existing Android basics page because the blog’s value is the abstraction of several Android techniques, not a Samsung-specific page.
The additions cover exported receiver challenge-response bypasses with startup-seeded RNGs and crash-to-restart primitives,
DocumentProvider-driven restore/import path traversal leading to arbitrary file write in the victim sandbox, deterministic installer cache/artifact substitution, and custom APK signature-scheme confusion with a conciseapksignerflow. I also updated the final## Referencesblock with the Bugscale post and the relevant Android/Samsung docs.git diff --checkis clean, and only this file was modified.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.