2022-02-02 14:47:55 +00:00
|
|
|
# Mobile Verification Toolkit (MVT)
|
2023-09-09 15:55:27 +00:00
|
|
|
# Copyright (c) 2021-2023 The MVT Authors.
|
2022-02-02 14:47:55 +00:00
|
|
|
# Use of this software is governed by the MVT License 1.1 that can be found at
|
|
|
|
# https://license.mvt.re/1.1/
|
|
|
|
|
|
|
|
import logging
|
2024-03-31 23:49:08 +00:00
|
|
|
from typing import Optional
|
2022-02-02 14:47:55 +00:00
|
|
|
|
2024-03-31 23:49:08 +00:00
|
|
|
from mvt.android.artifacts.dumpsys_packages import DumpsysPackagesArtifact
|
|
|
|
from mvt.android.utils import DANGEROUS_PERMISSIONS, DANGEROUS_PERMISSIONS_THRESHOLD
|
2022-07-05 16:10:48 +00:00
|
|
|
|
2022-02-02 14:47:55 +00:00
|
|
|
from .base import BugReportModule
|
|
|
|
|
|
|
|
|
2024-03-31 23:49:08 +00:00
|
|
|
class Packages(DumpsysPackagesArtifact, BugReportModule):
|
2022-02-02 14:47:55 +00:00
|
|
|
"""This module extracts details on receivers for risky activities."""
|
|
|
|
|
2022-08-16 11:39:55 +00:00
|
|
|
def __init__(
|
|
|
|
self,
|
2022-08-17 13:52:17 +00:00
|
|
|
file_path: Optional[str] = None,
|
|
|
|
target_path: Optional[str] = None,
|
|
|
|
results_path: Optional[str] = None,
|
2023-07-17 16:29:43 +00:00
|
|
|
module_options: Optional[dict] = None,
|
2022-08-16 11:39:55 +00:00
|
|
|
log: logging.Logger = logging.getLogger(__name__),
|
2023-06-01 21:40:26 +00:00
|
|
|
results: Optional[list] = None,
|
2022-08-16 11:39:55 +00:00
|
|
|
) -> None:
|
2023-06-01 21:40:26 +00:00
|
|
|
super().__init__(
|
|
|
|
file_path=file_path,
|
|
|
|
target_path=target_path,
|
|
|
|
results_path=results_path,
|
2023-07-17 16:29:43 +00:00
|
|
|
module_options=module_options,
|
2023-06-01 21:40:26 +00:00
|
|
|
log=log,
|
|
|
|
results=results,
|
|
|
|
)
|
2022-02-02 14:47:55 +00:00
|
|
|
|
2022-06-17 20:30:46 +00:00
|
|
|
def run(self) -> None:
|
2024-03-31 23:49:08 +00:00
|
|
|
data = self._get_dumpstate_file()
|
|
|
|
if not data:
|
2023-06-01 21:40:26 +00:00
|
|
|
self.log.error(
|
|
|
|
"Unable to find dumpstate file. "
|
|
|
|
"Did you provide a valid bug report archive?"
|
|
|
|
)
|
2022-02-02 14:47:55 +00:00
|
|
|
return
|
|
|
|
|
2024-03-31 23:49:08 +00:00
|
|
|
data = data.decode("utf-8", errors="replace")
|
|
|
|
content = self.extract_dumpsys_section(data, "DUMP OF SERVICE package:")
|
|
|
|
self.parse(content)
|
2022-02-03 18:55:18 +00:00
|
|
|
|
2022-07-05 16:10:48 +00:00
|
|
|
for result in self.results:
|
|
|
|
dangerous_permissions_count = 0
|
2022-08-17 16:24:51 +00:00
|
|
|
for perm in result["permissions"]:
|
|
|
|
if perm["name"] in DANGEROUS_PERMISSIONS:
|
2022-07-05 16:10:48 +00:00
|
|
|
dangerous_permissions_count += 1
|
|
|
|
|
|
|
|
if dangerous_permissions_count >= DANGEROUS_PERMISSIONS_THRESHOLD:
|
2023-06-01 21:40:26 +00:00
|
|
|
self.log.info(
|
|
|
|
'Found package "%s" requested %d potentially dangerous permissions',
|
|
|
|
result["package_name"],
|
|
|
|
dangerous_permissions_count,
|
|
|
|
)
|
2022-07-05 16:10:48 +00:00
|
|
|
|
2022-02-03 18:55:18 +00:00
|
|
|
self.log.info("Extracted details on %d packages", len(self.results))
|