0:00
what's going on YouTube geosar right
0:01
here it looks like we're not done with
0:03
iOS vulnerabilities just yet another one
0:05
just dropped and this one is a safari
0:06
vulnerability which means you could use
0:08
this to do something without a computer
0:10
for example to use it in a jailbreak
0:12
without a computer or in tools similar
0:14
to that not alone but in combination
0:17
with other vulnerabilities this video is
0:18
brought to you by tenor share rbot a
0:20
software that allows to easily downgrade
0:21
from IOS 18 to other iOS 18 versions in
0:25
order to install a better version that
0:26
work better for your device you can also
0:28
easily repair your device if it's stuck
0:30
in recovery mode boot loop black screen
0:32
blue screen stuff like that you can one
0:33
click reset and you can even exit and
0:35
enter recovery mode definitely check the
0:37
program out in the link below so
0:39
recently in a previous video we talked
0:41
about this formability on iio Surface
0:43
which was uh released as a proof of
0:44
concept for iOS 18 this was patched in
0:46
iOS 18.1 and it's a kernel vulnerability
0:49
which could potentially be used for gelp
0:51
purposes although the success rate for
0:53
it would probably be very bad because
0:55
it's a use after free type of
0:56
vulnerability and this one is already
0:58
public here on GitHub you can check it
1:00
out check out the previous video if you
1:02
want to learn more about it it's not
1:03
useless it could potentially be useful
1:05
if exploited especially for
1:06
customization applications however a
1:08
brand new vulnerability just dropped
1:10
this one over here and it's cve 2024
1:13
44308 and it says in here it's a bug
1:16
recently discovered in Apple Safari I'm
1:18
currently developing a proof of concept
1:20
code along with a brief explanation of
1:22
this vulnerability posted this developer
1:24
over here and then they posted this
1:26
article it says in the wild cve 2024
1:28
44308 Apple Safari JavaScript core
1:31
remote code execution vulnerability and
1:33
this one was essentially patched in iOS
1:38
18.11 as you probably know by now you
1:41
get two sets of updates you can get ios
1:43
17 so you can continue to use iOS 17 and
1:47
17.72 but you also get the iOS 18 update
1:50
and you can get to choose between them
1:52
for a while so this bug was also patched
1:54
in 17.72 but also on iOS
1:57
18.11 so it's a remote code execution
2:00
type of bug you can indeed find it if
2:02
you're looking here it says JavaScript
2:04
core processing maliciously crafted web
2:06
content may lead to arbitary code
2:08
execution apple is aware of a report
2:10
that this issue may have been actively
2:12
exploited on Intel based Mac systems
2:15
this was actually found in the wild
2:17
somebody was actually using this to
2:18
attack various machines so it's powerful
2:21
enough to do that so it might be
2:22
powerful enough to be useful for
2:24
jailbreak purposes not alone of course
2:26
not alone you still need the colel
2:28
vulnerability you still need the PAC IPS
2:30
stuff like that to create a full Safari
2:32
based jailbreak and those are pretty
2:34
rare these days so it's more of wishful
2:36
thinking but this vulnerability seems
2:38
strong enough to be useful for such a
2:39
thing if we can pair it up with what we
2:41
need there's also a web kit over here
2:44
which says basically the same thing and
2:46
it was also exploited in the wild so
2:48
they might have found something quite
2:50
important in here the information about
2:52
the vulnerability is available over here
2:54
an analysis A diff of the files showing
2:56
where and what changed and um yeah you
2:59
could actually see the web kit Comet
3:01
which changes the which patches the
3:03
vulnerability and there's also an
3:05
unfinished proof of concept which
3:07
according to the developer say in here
3:09
the code will be updated once it's
3:11
finished so yeah this could possibly be
3:12
very useful same with this one over here
3:14
two brand new vulnerabilities for iOS 18
3:17
as well as iOS 17 we don't know what
3:19
will come from them and I'm not going to
3:21
promise you you're going to get a Safari
3:22
based jailbreak out of this they could
3:24
possibly be used for such a thing and it
3:26
all depends on who exploits them what
3:28
they do or if we just leave them sitting
3:30
so that's basically it thank you for
3:32
watching I GSN till the next time
3:34
subscribe to stay updated and peace out