关联漏洞
标题:
Apple多款产品 安全漏洞
(CVE-2025-24132)
描述:Apple FairPlay等都是美国苹果(Apple)公司的产品。Apple FairPlay是一个用于为设备提供媒体播放功能的核心组件。Apple AirPlay audio SDK是一个官方开发套件,允许第三方硬件产品集成AirPlay音频流协议,实现苹果设备到音响设备的无线音频传输。Apple AirPlay video SDK是一个官方授权开发套件,允许第三方设备接收来自Apple设备的无线视频流。 Apple多款产品存在安全漏洞,该漏洞源于内存处理不当,可能导致应用意外终止。以下产品受到影响:
介绍
[EN](README.md) | [KR](korean.md)
---
## 📄 Overview
This tool discovers AirPlay-capable devices on your local network via mDNS (Zeroconf) and tests them for the CVE-2025-24132 “zero-click” HTTP RCE vulnerability. Discovered devices are listed in a simple GUI; click a device to view all retrieved properties.
---
### Prerequisites
* Python 3.7+
* PyQt5
* `zeroconf` package (`pip install zeroconf`)
### Installation
```bash
pip install PyQt5 zeroconf
````
or
```bash
pip install -r requirements.txt
```
### Usage
```bash
python3 main.py
```
* The GUI will open and automatically discover any AirPlay devices on the same LAN.
* Each discovered device shows as “<DeviceName> (<IP>)” with an initial “Scanning…” status.
* Once the RCE test completes, the right-hand column will update to **Vuln** (vulnerable) or **Safe**.
### Interface
* **Left column (“Device”)**: displays `<name> (IP address)`.
* **Right column (“RCE”)**: shows vulnerability status.
* **Single-click** a device row to expand and view all mDNS TXT properties
(e.g. `deviceid`, `model`, `osvers`, `features`, `srcvers`, etc.).
### How It Works
1. **Discovery**:
* Uses `zeroconf` to browse `_airplay._tcp.local.` services.
* Filters out `127.*` addresses and duplicates.
2. **Property Extraction**:
* Reads all TXT records (`info.properties`) into a dictionary.
3. **RCE Test (CVE-2025-24132)**:
* Crafts an HTTP `POST /pairing-init` with a dummy reverse-shell plist.
* Marks the device as vulnerable if **any** `HTTP` response is received.
4. **GUI Update**:
* Emits Qt signals to add a new row and later update its status.
* Stores each device’s full info (including TXT fields) in `self.device_info`.
文件快照
[4.0K] /data/pocs/46b91133191286149203230e0b226411e9371fc8
├── [2.0K] korean.md
├── [5.5K] main.py
├── [1.7K] README.md
└── [ 14] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。