Skip to content

Tom-ODonnell/TFP0-via-Safari-iOS-11.3.1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

!!! NOT USEFUL FOR END USERS !!!

THIS IS ONLY INTERESTING FOR DEVELOPERS, EXPECT NO SUPPORT IN ANY SHAPE OR FORM!

This exploit obtains tfp0 from the WebContent sandbox (i.e. from a website), via two known bugs: CVE-2018-4233 (discovered by saelo, reported via ZDI, exploit by niklasb) and CVE-2018-4243 (empty_list exploit by Ian Beer), both fixed in 11.4.

See pwn_i8.js for details.

I [niklsab] have no plans to work on this more. Stage 2 is closed source for now so people don't write malware, but I'm willing to provide sources to legitimate developers who want to build something awesome with it.

Works best when no other apps are running in the background and phone is left alone for a while before clicking on the final alert. Watch console for stage 2 progress.

About

This is a *mirror* of a POC Safari Exploit for iOS 11.3.1 that runs empty_list to achieve TFP0. This POC is by niklsab

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published