关联漏洞
介绍
CVE-2024-6778
This repository contains proof-of-concept exploits for CVE-2024-6778, which are vulnerabilities in the Chromium web browser that allow a sandbox escape via a browser extension. To run these exploits, you need a version of Chromium older than 126.0.6478.54.
Write-up: https://ading.dev/blog/posts/chrome_sandbox_escape.html
Bug report: https://issues.chromium.org/issues/338248595
CVE-2024-6778 directories contain a proof-of-concept Chrome extension that can execute arbitrary JavaScript on privileged WebUI pages. The CVE-2024-6778 exploit ismore stable.
The sandbox-escape directory contains the full exploit chain, utilizing CVE-2024-6778 to achieve code execution in chrome://policy, ultimately leading to a sandbox escape by manipulating legacy browser support policies.
This repository is licensed under the MIT License.
文件快照
[4.0K] /data/pocs/e2c648f79326d67e784f38f60cf58cb0c3557f76
└── [ 846] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。