On GitHub posted a PoC-code for vulnerabilities in the WebKit engine used in Apple Safari and other applications for operating systems macOS, iOS and Linux, which allows to execute arbitrary code.

According to the author of the exploit of Linus Henze (Henze Linus), the problem is already fixed in the main branch of WebKit, but it remains unpatched in iOS and macOS versions of Safari. The vulnerability affects iOS 12.0 and higher, and macOS 10.14 and later. Exploit is designed to run on both macOS and iOS, although the latter will require revision, recognizes Henze.

PoC-code to run shellcode in Safari and perform actions with the privileges of the browser, including to circumvent the same-origin policy (Same Origin Policy, SOP) and to access information of any loaded page. As noted, the exploit would be useless to an attacker, not in possession of technical skills, because it does not provide the ability to run code outside the browser. For this PoC-code to be used in conjunction with other exploits, including using the vulnerability allows the escape from the sandbox.

The vulnerability can affect not only Safari, but also other products that use the JavaScriptCore engine. Google Chrome browser problem does not occur, because it has a V8 engine.

Read more •••


Please enter your comment!
Please enter your name here