Cyber SecurityTech NewsTrending

Exclusive: MX Player RCE Vulnerability: MX Player Path Transversal to RCE

A new directory transversal vulnerability has been discovered in MX Player that can lead to arbitrary code execution in the victim’s device. The vulnerability was present in the sharing feature that is a direct phone-to-phone file sharing feature.

MX Player is a video player app that has over 500M+ downloads on the Play Store and has a rating of 4.4. It is available on iOS, Android, and the web.

MX Player Directory Transversal to RCE

The vulnerability can be tracked as CVE-2020–5764 and the vulnerability was present in the video-sharing feature that is a direct phone-to-phone file sharing feature. 

The vulnerability was a directory transversal vulnerability through which an attacker can achieve remote code execution. An attacker can exploit this by connecting to the MX Transfer session as a “sender” and sending a MessageType of “FILE_LIST” with a “name” field containing directory traversal characters (../). This will result in the file being transferred to the victim’s phone, but being saved outside of the intended “/sdcard/MXshare” directory.

And, in some cases, an attacker can achieve remote code execution by writing “.odex” and “.vdex” files in the “oat” directory of the MX Player application.

A PoC for the MX Player Remote Code Execution vulnerability has been made available on Github for a detail explanation about the vulnerability read here.

Patch for the MX Player Vulnerability

After the discovery of the vulnerability of the security, the researcher has mailed the company about the vulnerability and the company has patched the vulnerability with the v1.24.5 release.

Satender Kumar

A Blogger always fascinated with the technology and gather as much amount of knowledge from the internet. Loves to share the knowledge with the others and always available to play chess.

Related Articles

Leave a Reply

Back to top button
The Tech Infinite