POC详情: 46b91133191286149203230e0b226411e9371fc8

来源
关联漏洞
标题: Apple多款产品 安全漏洞 (CVE-2025-24132)
描述:Apple FairPlay等都是美国苹果(Apple)公司的产品。Apple FairPlay是一个用于为设备提供媒体播放功能的核心组件。Apple AirPlay audio SDK是一个官方开发套件,允许第三方硬件产品集成AirPlay音频流协议,实现苹果设备到音响设备的无线音频传输。Apple AirPlay video SDK是一个官方授权开发套件,允许第三方设备接收来自Apple设备的无线视频流。 Apple多款产品存在安全漏洞,该漏洞源于内存处理不当,可能导致应用意外终止。以下产品受到影响:
介绍
[EN](README.md) | [KR](korean.md)

---

## 📄 Overview

This tool discovers AirPlay-capable devices on your local network via mDNS (Zeroconf) and tests them for the CVE-2025-24132 “zero-click” HTTP RCE vulnerability. Discovered devices are listed in a simple GUI; click a device to view all retrieved properties.

---

### Prerequisites

* Python 3.7+
* PyQt5
* `zeroconf` package (`pip install zeroconf`)

### Installation

```bash
pip install PyQt5 zeroconf
````

or

```bash
pip install -r requirements.txt
```

### Usage

```bash
python3 main.py
```

* The GUI will open and automatically discover any AirPlay devices on the same LAN.
* Each discovered device shows as “<DeviceName> (<IP>)” with an initial “Scanning…” status.
* Once the RCE test completes, the right-hand column will update to **Vuln** (vulnerable) or **Safe**.

### Interface

* **Left column (“Device”)**: displays `<name> (IP address)`.
* **Right column (“RCE”)**: shows vulnerability status.
* **Single-click** a device row to expand and view all mDNS TXT properties
  (e.g. `deviceid`, `model`, `osvers`, `features`, `srcvers`, etc.).

### How It Works

1. **Discovery**:

   * Uses `zeroconf` to browse `_airplay._tcp.local.` services.
   * Filters out `127.*` addresses and duplicates.

2. **Property Extraction**:

   * Reads all TXT records (`info.properties`) into a dictionary.

3. **RCE Test (CVE-2025-24132)**:

   * Crafts an HTTP `POST /pairing-init` with a dummy reverse-shell plist.
   * Marks the device as vulnerable if **any** `HTTP` response is received.

4. **GUI Update**:

   * Emits Qt signals to add a new row and later update its status.
   * Stores each device’s full info (including TXT fields) in `self.device_info`.

文件快照

[4.0K] /data/pocs/46b91133191286149203230e0b226411e9371fc8 ├── [2.0K] korean.md ├── [5.5K] main.py ├── [1.7K] README.md └── [ 14] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。