![]() |
#16 | |
Carpe diem, c'est la vie.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,433
Karma: 10773668
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
|
Quote:
Unless amazon patched it in 5.1.0, you could previously visit any web page over 3G by clicking a link to google on a facebook "desktop site" page, from social networking. There was a youtube video showing this but google seems to not be finding it now. Aha... found it. This worked on stock firmware, no jailbreak, no hacks. It seems that accessing the web with the social network "browser" uses a relaxed rule set. I see that the video says that it is also for 5.1.0. This new updated video was just posted 2 weeks ago. I am sure that I first saw this long before 5.1.0 was around. The old one showed a closeup of the 3G connection. This one cheats and uses wifi, but he SAYS it also works on 3G. The old video SHOWED a 3G demo. I wonder if the old video is still out there,,, ![]() Of course, this is complicated enough to be only useful in a real emergency, or by an automated tool such as a botnet might use. Also, after the gaping security hole announced in this thread, it may be worth looking for more security screw-ups that they added to this firmware version. Perhaps we can get root shell from the search bar now by escalating a framework shell? (FYI I used a netcat reverse shell started from the home page search bar when I was trying to get root on 5.0.0, running as user "framework", back before the MP3 jailbreak). Note to amazon staff: We want root access so we can add fun things to our kindles, such as these: geekmaster kindle video player: https://www.mobileread.com/forums/sho...d.php?t=177455 [Kindle Touch] xterm & matchbox-keyboard: https://www.mobileread.com/forums/sho...d.php?t=179286 newtrix - geekmaster's new tricks: https://www.mobileread.com/forums/sho...d.php?t=176802 But ESPECIALLY so we can continue to help debrick kindles for people who found us AFTER your firmware updates bricked their unmodified kindle. Please continue to add features and fix bugs (instead of adding new bugs like 5.1.0 did, which bricked a lot of kindles). But while you are making things BETTER, do not lock us out! Adding obfuscation to the java code in 5.1.0 is very annoying but does not really slow anybody down. Please stop doing that crap, okay? Last edited by geekmaster; 05-27-2012 at 10:14 PM. |
|
![]() |
![]() |
![]() |
#17 | |
(offline)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,907
Karma: 6736094
Join Date: Dec 2011
Device: K3, K4, K5, KPW, KPW2
|
Quote:
@Amazon: While you're at it... this post contains a similar request, and similar arguments (read the parts in red). This forum is not a threat to you. On the contrary: We are, in fact, helping you to make your products better, and we support your user base. So please, just stop making our lives more difficult for no reason. |
|
![]() |
![]() |
![]() |
#18 |
but forgot what it's like
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 741
Karma: 2345678
Join Date: Dec 2011
Location: north (by northwest)
Device: Kindle Touch
|
No, they will not read it. They don't look here. Only I am reading your entreaties here
![]() Anyway, did anybody wrote to Amazon/Lab126 about this attack vector? I'm really think this forum isn't monitored by Amazon staff. And while I personally will not contact with Amazon, I have no objections about reporting it ASAP. Last edited by eureka; 05-31-2012 at 05:36 AM. |
![]() |
![]() |
![]() |
#19 | |
Carpe diem, c'est la vie.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,433
Karma: 10773668
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
|
Quote:
|
|
![]() |
![]() |
![]() |
#20 |
(offline)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,907
Karma: 6736094
Join Date: Dec 2011
Device: K3, K4, K5, KPW, KPW2
|
BTW, this has just been covered on the largest german-speaking IT website: http://www.heise.de/meldung/Sicherhe...h-1636888.html
I guess this puts a bit more pressure on Amazon to finally roll out a fix for the issue: "Gegenüber heise Security erklärte Amazons Sicherheitsabteilung, dass sie bereits an einem Patch arbeitet." -- "Amazon's security department told heise Security that they are already working on a patch". |
![]() |
![]() |
![]() |
#21 |
Carpe diem, c'est la vie.
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,433
Karma: 10773668
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
|
It will be "interesting" to see what new exploitable bugs they add when they fix this one.
![]() I wonder why it is taking them so long to fix this one... |
![]() |
![]() |
![]() |
#22 |
(offline)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,907
Karma: 6736094
Join Date: Dec 2011
Device: K3, K4, K5, KPW, KPW2
|
Security fix
OK, so... I'm attaching an update package which can disable (or re-enable) the vulnerability, until Amazon comes up with a proper patch.
To install the package, your device obviously needs to be jailbroken. Ironically, if needed, the jailbreak can be installed using the very vulnerability that this package fixes ![]() EDIT: There's a typo in the README: Of course, the vulnerability isn't triggered, but it (rather: its availability) is toggled. Sorry for the potential confusion. EDIT 2: This is obsolete. The vulnerability has been fixed with Firmware 5.1.2. Last edited by ixtab; 07-23-2012 at 11:39 PM. |
![]() |
![]() |
![]() |
#23 |
Groupie
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 164
Karma: 164969
Join Date: Dec 2011
Device: Palm IIIx, (iPhone|Kindle) Touch
|
I wonder who gave Heise the hint about this exploit or which of the forum goers in here is a Heise employee.
![]() Or maybe it was time again for a Kindle article and Heise didn't have anything else to write about. ![]() |
![]() |
![]() |
![]() |
#24 | |
Groupie
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 164
Karma: 164969
Join Date: Dec 2011
Device: Palm IIIx, (iPhone|Kindle) Touch
|
Quote:
![]() |
|
![]() |
![]() |
![]() |
#25 | |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 91
Karma: 14730
Join Date: Jun 2012
Device: none
|
Quote:
|
|
![]() |
![]() |
![]() |
#26 |
but forgot what it's like
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 741
Karma: 2345678
Join Date: Dec 2011
Location: north (by northwest)
Device: Kindle Touch
|
It's old news already, but I'd like to see them here for completeness.
Update to 5.1.2 (amongst other changes) deletes NPAPI plugin /usr/lib/libkindleplugin.so, symlink /usrl/lib/browser/plugins/libkindleplugin.so and directory /usr/lib/browser, thus eliminating possible remote attack vector. I didn't update to 5.1.2 yet, so I can't confirm, whether setting of LIPC property of com.lab126.system still allow executing of arbitrary shell code. Anybody willing to check? (Anyway, it's a minor nuisance, as without browser plugin there is no more obvious remote access to KT.) ![]() ![]() |
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Kindle touch browser javascript capabilities | iPocketBook | Kindle Developer's Corner | 14 | 01-03-2013 09:10 AM |
Kindle 4 (Non-Touch) Can you DELETE the browser? | nsomniac | Amazon Kindle | 3 | 03-30-2012 07:22 PM |
Kindle Touch Bypass 3G Browser Restriction? | copy1 | Amazon Kindle | 3 | 02-04-2012 02:52 PM |
eReader.com Browser Search Plugin | Zero9 | Deals and Resources (No Self-Promotion or Affiliate Links) | 0 | 07-24-2009 09:44 PM |
BooksOnBoard Browser Search Plugin | Zero9 | Deals and Resources (No Self-Promotion or Affiliate Links) | 10 | 07-24-2009 03:27 PM |