This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension.
To run these, you must be on a version of Chromium older than 126.0.6478.54
.
Write up
Bug report
Both the CVE-2024-5386
and CVE-2024-6778
directories contains a POC Chrome extension that is able to execute arbitrary JS on privileged WebUI pages. CVE-2024-5386
relies on a race condition and is fairly unreliable, while CVE-2024-6778
does not.
The sandbox-escape
directory contains the full exploit chain, using CVE-2024-6778
to gain code execution in chrome://policy
, which leads to a sandbox escape by setting the legacy browser support policies.
This repository is licensed under the MIT license.
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…