https://github.com/exodusintel/CVE-2019-5786
FileReader Exploit
https://github.com/exodusintel/CVE-2019-5786
Last synced: about 2 months ago
JSON representation
FileReader Exploit
- Host: GitHub
- URL: https://github.com/exodusintel/CVE-2019-5786
- Owner: exodusintel
- Created: 2019-03-20T18:43:49.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2019-03-20T18:47:25.000Z (about 6 years ago)
- Last Synced: 2024-11-03T04:32:26.502Z (6 months ago)
- Language: JavaScript
- Size: 4.88 KB
- Stars: 257
- Watchers: 15
- Forks: 81
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - exodusintel/CVE-2019-5786 - FileReader Exploit (JavaScript)
README
CVE-2019-5786 Chrome 72.0.3626.119 stable FileReader UaF exploit for Windows 7 x86.
This exploit uses site-isolation to brute-force the vulnerability. iframe.html is the wrapper script that loads the exploit, contained in the other files, repeatedly into an iframe.
* host iframe.html on one site and exploit.html, exploit.js and wokrer.js on another. Change line 13 in iframe.html to the URL of exploit.html
* start chrome with the --no-sandbox argument
* navigate to iframe.html