Win32k Exploit by Grant WillcoxCVE-2019-5786 and CVE-2019-0808 Chrome 72.0.3626.119 stable Windows 7 x86 exploit chain.
This exploit uses site-isolation to brute-force CVE-2019-5786. `host1_wrapper/iframe.html` is the wrapper script that loads the exploit repeatedly into an iframe. The actual chain resides in the `host2_single_run` directory. The sandbox escape exploit for CVE-2019-0808 is in the file `host2_single_run/shellcode.js`, converted from its .dll form via [sRDI][https://github.com/monoxgas/sRDI] and msfvenom.
* serve the contents of the `host1_wrapper` directory on one site and the contents of `host2_single_run` on another
* change line 14 in `host1_wrapper/iframe.html` to the URL of `host2_single_run/exploit.html`
* navigate to iframe.html
[4.0K] /data/pocs/9e22460f2ea051d683ba286dfb53a02974e66add
├── [4.0K] FullChainChromeExploit
│ ├── [4.0K] FullChainChromeExploit
│ │ ├── [4.0K] Debug
│ │ │ ├── [ 44K] dllmain.obj
│ │ │ ├── [4.0K] FullChai.0ED4478A.tlog
│ │ │ │ ├── [3.3K] CL.command.1.tlog
│ │ │ │ ├── [ 16K] CL.read.1.tlog
│ │ │ │ ├── [3.0K] CL.write.1.tlog
│ │ │ │ ├── [ 233] FullChainChromeExploit.lastbuildstate
│ │ │ │ ├── [1.8K] link.command.1.tlog
│ │ │ │ ├── [3.8K] link.read.1.tlog
│ │ │ │ └── [1.2K] link.write.1.tlog
│ │ │ ├── [1.6K] FullChainChromeExploit.Build.CppClean.log
│ │ │ ├── [1.1K] FullChainChromeExploit.log
│ │ │ ├── [3.2K] FullChainChromeExploit.obj
│ │ │ ├── [7.2M] FullChainChromeExploit.pch
│ │ │ ├── [153K] stdafx.obj
│ │ │ ├── [251K] vc141.idb
│ │ │ └── [500K] vc141.pdb
│ │ ├── [ 26K] dllmain.cpp
│ │ ├── [ 120] FullChainChromeExploit.cpp
│ │ ├── [8.5K] FullChainChromeExploit.vcxproj
│ │ ├── [1.3K] FullChainChromeExploit.vcxproj.filters
│ │ ├── [ 165] FullChainChromeExploit.vcxproj.user
│ │ ├── [4.0K] Release
│ │ │ ├── [1.8K] FullChainChromeExploit.Build.CppClean.log
│ │ │ └── [ 3] FullChainChromeExploit.log
│ │ ├── [ 21] stdafx.cpp
│ │ ├── [ 412] stdafx.h
│ │ └── [ 314] targetver.h
│ └── [1.4K] FullChainChromeExploit.sln
├── [100K] FullChainChromeExploit.dll
├── [4.0K] host1_wrapper
│ └── [1.1K] iframe.html
├── [4.0K] host2_single_run
│ ├── [ 371] exploit.html
│ ├── [ 11K] exploit.js
│ ├── [304K] shellcode.js
│ ├── [4.0K] wasm
│ │ ├── [100K] helloo.html
│ │ ├── [ 95K] helloo.js
│ │ └── [ 41K] helloo.wasm
│ └── [ 30] worker.js
└── [ 734] README.md
8 directories, 36 files