Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-17463 PoC — Google Chrome V8 输入验证错误漏洞

Source
Associated Vulnerability
Title:Google Chrome V8 输入验证错误漏洞 (CVE-2018-17463)
Description:Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器。V8是其中的一套开源JavaScript引擎。 Google Chrome 70.0.3538.67之前版本中的V8存在安全漏洞。远程攻击者可借助特制的HTML页面利用该漏洞在沙盒内执行任意代码。
Description
Working Proof of Concept Exploit for CVE-2018-17463
Readme
# CVE-2018-17463
Working Proof of Concept Exploit for CVE-2018-17463 utilzing WebAssembly RWX Pages for Shellcode execution.

CVE-2018-17463 stemmed from the incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64, allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

This Proof of Concept is directly related to the following blog posts:

* [Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals](https://jhalon.github.io/chrome-browser-exploitation-1/)
* [Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan](https://jhalon.github.io/chrome-browser-exploitation-2/)
* [Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463](https://jhalon.github.io/chrome-browser-exploitation-3/)

The original writeup for this bug was presented in [Phrack: Exploiting Logic Bugs in JavaScript JIT Engines](http://phrack.org/issues/70/9.html#article) by [Samuel Gross](https://twitter.com/5aelo?lang=en). 

All credits to finding the bug and writing the initial proof of concept go to Samuel Gross.
File Snapshot

[4.0K] /data/pocs/e141d0e0b1c735f38292f5a88bf6f382d4d91685 ├── [7.7K] CVE-2018-17463.js └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.