# CVE-2023-41993 Exploit PoC
This repository contains a Proof of Concept (PoC) exploit for the CVE-2023-41993 vulnerability.
This PoC demonstrates limited read/write primitives based on the PoC released by [po6ix](https://github.com/po6ix/POC-for-CVE-2023-41993).
Demo of this PoC can be found [here](https://0x06060606.github.io/CVE-2023-41993/pwn.html).
Please make an issue if you have any questions, suggestions, or concerns. :) <3
## Tested Devices
* iPhone 14 Pro Max (iOS 17.0 Beta 2)
# Clone this repository
git clone https://github.com/0x06060606/CVE-2023-41993.git
# Go into the repository directory
# Install dependencies
pip3 install -r requirements.txt
# Start the server
# Open Safari and navigate to
## Vulnerability Details
CVE-2023-41993 is a critical vulnerability rooted in the WebKit browser engine, affecting various Apple products. It allows for arbitrary code execution upon processing malicious web content. More details can be found in the [advisory](https://support.apple.com/en-us/HT213926) and [WebKit's commit](https://github.com/WebKit/WebKit/commit/08d5d17c766ffc7ca6a7c833c5720eb71b427784) addressing the issue.
## Exploit Overview
* [po6ix](https://github.com/po6ix/POC-for-CVE-2023-41993) for the original PoC
* [Apple](https://support.apple.com/en-us/HT213926) for vulnerability details
* [WebKit](https://github.com/WebKit/WebKit/commit/08d5d17c766ffc7ca6a7c833c5720eb71b427784) for addressing the vulnerability
This PoC is intended for educational purposes only. This PoC is not intended to be used for malicious purposes. I am in no way responsible for any misuse of this PoC.
This PoC is licensed under the MIT License.