20 lines
No EOL
666 B
Text
20 lines
No EOL
666 B
Text
Source: https://github.com/theori-io/chakra-2016-11
|
|
|
|
Proofs of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40990.zip
|
|
|
|
|
|
chakra.dll Info Leak + Type Confusion for RCE
|
|
|
|
Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)
|
|
|
|
Tested on Windows 10 Edge (modern.ie stable).
|
|
|
|
FillFromPrototypes_TypeConfusion.html: WinExec notepad.exe
|
|
|
|
FillFromPrototypes_TypeConfusion_NoSC.html: 0xcc (INT 3)
|
|
|
|
To run:
|
|
|
|
Download exploit/FillFromPrototypes_TypeConfusion.html to a directory.
|
|
Serve the directory using a webserver (or python's simple HTTP server).
|
|
Browse with a victim IE to FillFromPrototypes_TypeConfusion.html. |