Using @fridadotre and the script attached, I managed to bypass the escalate and isEscalated methods and become rootpic.twitter.com/oXGGEIqFad
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
So that means this wording is incorrect? "This also means that it's possible for any Android app to achieve root using this method, which opens up OP devices to massive security issues."
Yes. An app can use this attack for example https://researchcenter.paloaltonetworks.com/2017/09/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions …, send the "magic" intent and so allow adb root. From now, that's all
But granting ADB root still means that the exploiter needs ADB access in the first place, right? So it's not like a random app can exploit this then wreck havoc with root access—only someone with physical ADB access.
Yes you're right. However there are other implications. When the "magic intent" is executed it set the system property oem.selinux.reload_policy to 1. There is also an "engineer mode" which correspond to persist.sys.adb.engineermode
So for now, it too early to speak about a random app getting root access but we are on the good tracks
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.