This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension.
To run these, you must be on a version of Chromium older than 126.0.6478.54
.
Write up
Bug report
Both the CVE-2024-5386
and CVE-2024-6778
directories contains a POC Chrome extension that is able to execute arbitrary JS on privileged WebUI pages. CVE-2024-5386
relies on a race condition and is fairly unreliable, while CVE-2024-6778
does not.
The sandbox-escape
directory contains the full exploit chain, using CVE-2024-6778
to gain code execution in chrome://policy
, which leads to a sandbox escape by setting the legacy browser support policies.
This repository is licensed under the MIT license.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…