jezzus / CVE-2018-4121

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2018-4121 - Safari Wasm Sections POC RCE Exploit

by MWR Labs (c) 2018

Details

  • this proof of concept exploit targets Safari 11.0.3 (13604.5.6) on macOS 10.13.3 (17D47) versions only.
  • compile the payload of your choice as a dylib with a constructor
  • run python file_to_jsarray.py your.dylib payload.js
  • serve this directory and point Safari to /exploit.html
  • exploit is not fully reliable and uses hardcoded offsets for this macOS/Safari version.
  • exploit takes a while to run due to the size of the heap spray (24.5GB).
  • this issue is addressed in macOS 10.13.4 as CVE-2018-4121 (https://support.apple.com/en-gb/HT208692)

Credits

References

About


Languages

Language:JavaScript 96.6%Language:Python 1.8%Language:Objective-C 1.2%Language:HTML 0.4%