Skip to content
This repository has been archived by the owner on Oct 3, 2023. It is now read-only.

Commit

Permalink
Clarify README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
LinusHenze committed Dec 9, 2018
1 parent b7cd6b3 commit ee15f2f
Showing 1 changed file with 8 additions and 1 deletion.
9 changes: 8 additions & 1 deletion README.md
@@ -1,5 +1,6 @@
# PLEASE READ THIS FIRST
This is currently only patched in the WebKit sources (just to clarify this: Yes, it still works on iOS 12.1.1, meaning every iOS version since 12.0 is vulnerable. There is currently no iOS 12.x version that is not vulnerable. Every macOS version since 10.14.0 is vulnerable as well.) and works with the latest version of Safari (macOS and iOS, although this needs to be updated in order to work with iOS).
This is currently only patched in the WebKit master branch (not in any version shipped in macOS/iOS) and works with the latest version of Safari (macOS and iOS, although shellcode loading is not supported on iOS).
YES, iOS 12.1.1 IS SUPPORTED!
Please don't do evil stuff with this.
And if you're a normal user, this will be useless for you.

Expand All @@ -8,6 +9,12 @@ This is an exploit for the latest version of Safari (as of Dec. 6 2018). Fixed i
Huge thanks to Samuel Groß (@5aelo) for his awesome Int64 library.
You need to have a WebSocket Server running at Port 5000 or you get "Initialization failed".

# Supported iOS/macOS Versions
This exploit supports iOS 12.0 up to (and including!) iOS 12.1.1 as well as macOS 10.14.0 up to (and including!) macOS 10.14.2.
The latest version of Safari Technology Preview (for macOS) is not vulnerable as it contains a recent version of WebKit.
Please note that shellcode loading is currently not supported on iOS. (The exploit will run but later show "iOS is not supported yet!". This just means that shellcode loading is not supported on iOS, not that the exploit doesn't work on iOS)
In case you get "Addrof didn't work", just try the exploit again. If it still won't work after a couple of tries, it might be that Apple finally patched the vulnerability.

# Building
If you want to rebuild stage2, cd into stage2 then run python make.py.
For building you need to have gobjcopy installed. (brew install binutils)
Expand Down

0 comments on commit ee15f2f

Please sign in to comment.