tags:v8CTFchromelearning_resource original link: Exploiting V8 at openECSC newsletter link: exploits.club Weekly Newsletter 23
Exploits Club Summary:
“CTFs don’t help in the real world”. Yeah, well tell that to this challenge, which requires going from a V8 bug to shell. The challenge from openECSC introduces some new functionality in the V8 engine via a buggy patch. After identifying the vulnerability, exploitation follows the common pattern of “read arbitrary addresses (
addrof
), create fake objects (fakeobj
), and eventually reach arbitrary code execution.” If you are interested in getting started with V8 exploitation, this challenge and the subsequent write-up from @rebane2001 are a great place to get your feet wet.