Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6203 PoC — Apple iOS、macOS Mojave和tvOS 802.1X组件输入验证错误漏洞

Source
Associated Vulnerability
Title:Apple iOS、macOS Mojave和tvOS 802.1X组件输入验证错误漏洞 (CVE-2019-6203)
Description:Apple iOS等都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple tvOS是一套智能电视操作系统。Apple macOS Mojave是一套专为Mac计算机所开发的专用操作系统。 Apple iOS 12.2之前版本、macOS Mojave 10.14.4之前版本和tvOS 12.2之前版本中的802.1X组件存在安全漏洞。攻击者可利用该漏洞拦截网络流量。
Description
PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4
Readme
# CVE-2019-6203-PoC
There is a PEAP bug in all Apple devices that would allow an attacker to force any Apple device (iOS, macOS or tvOS) to associate with a malicious access point.

This is a PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4, tested on Kali Linux.

You need a Wi-Fi card that supports **AP mode** to run this PoC. You can check this by running ```iw list```, outputs like:
```
Supported interface modes:
	 * IBSS
	 * managed
	 * AP
	 * AP/VLAN
	 * monitor
	 * mesh point
```

## Usage
```
apt install hostapd-wpe dnsmasq
git clone https://github.com/qingxp9/CVE-2019-6203-PoC
cd CVE-2019-6203-PoC
python CVE-2019-6203-PoC.py -i wlan0

#with Internet
python CVE-2019-6203-PoC.py -i wlan0 -o eth0
```

## Reference
- https://sensepost.com/blog/2019/understanding-peap-in-depth/
- https://www.freebuf.com/vuls/203484.html

video: https://youtu.be/UEzdtkcnrYw

File Snapshot

[4.0K] /data/pocs/4a205e537ae0e53b5be94a837b21f4cb95c267fc ├── [1.8K] CVE-2019-6203-PoC.py ├── [ 34K] LICENSE └── [ 884] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.