A in-the-wild V8 type confusion bug.
This repository contains
- Analysis and PoCs to escalate this vulnerability to have the same exploit pattern as CVE-2024-12695, Object Hash Reassign.
- AddressOf / FakeObject Primitives constructed by using the type confusion to assign object hash to
JSArray'slengthfield and its analysis.
Analysis: Analysis.md
- OS: Ubuntu 24.04
- Git Commit: 12.4.254.16
- Shoutout to Vasily Berdnikov @vaber_b and Boris Larin @oct0xor for finding the bug.
- Shoutout to @buptsb and @mistymntncop for writing a detailed analysis about this bug, which offers precious experience to facilitate research on this bug.
- Shoutout to 303f06e3 and Dimitri Fourny @DimitriFourny for revealing the brand new exploit pattern, Object Hash Reassign.
- Shoutout to @mistymntncop for providing a reference to Kaspersky official writeup The Crypto Game of Lazarus APT: Investors vs. Zero-days.
- https://issues.chromium.org/issues/340221135
- https://web.archive.org/web/20250426073331/https://buptsb.github.io/blog/post/CVE-2024-4947-%20v8%20incorrect%20AccessInfo%20for%20module%20namespace%20object%20causes%20Maglev%20type%20confusion.html
- https://issues.chromium.org/issues/383647255
- https://bugscale.ch/blog/dissecting-cve-2024-12695-exploiting-object-assign-in-v8/
- https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/
This repository is intended solely for educational purposes and must not be used for any malicious activities.