6.8
CVSSv2

CVE-2018-17463

Published: 14/11/2018 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Incorrect side effect annotation in V8 in Google Chrome before 70.0.3538.64 allowed a remote malicious user to execute arbitrary code inside a sandbox via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

redhat linux desktop 6.0

redhat linux server 6.0

redhat linux workstation 6.0

debian debian linux 9.0

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2018-5179 Yannic Boneberger discovered an error in the ServiceWorker implementation CVE-2018-17462 Ned Williamson and Niklas Baumstark discovered a way to escape the sandbox CVE-2018-17463 Ned Williamson and Niklas Baumstark discovered a remote code executi ...
Incorrect side effect annotation in V8 in Google Chrome prior to 700353864 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page ...
A remote code execution issue has been found in the V8 component of the chromium browser before 700353867 ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::HttpServer def initialize(info = {}) super(update_info(info, 'Name' => 'Google C ...

Github Repositories

Completed a working exploit for CVE-2018-17463 for fun.

CVE-2018-17463 Completed a working exploit for CVE-2018-17463 for fun The original writeup that I found on this bug was here phrackorg/papers/jit_exploitationhtml I just really wanted to change this arb r/w into a fully working exploit Also I learned the JIT spray technique from the following paper which is an interesting read @inproceedings{gawlik2018sok, title=

Pwnable Challs related to Javascript Engines (including CVE cases)

JSEChalls 35C3 (2018) - krautflare CONFidence (2020) - chromatic-aberration SpamAndFlags (2020) - nativity_scene StarCTF (2019) - V8 OOB aSiagaming_Chrome-v8-tutorials - V8 OOB PlaidCTF (2018) - roll a d8 CVE CVE-2018-17463 - Objectcreate Type-Confusion

CVE-1day My 1-day studies CVE list CVE-2018-17463 (Chrome/V8) CVE-2023-3079 (Chrome/V8) CVE-2023-4762 (Chrome/V8) CVE-2024-0517 (Chrome/V8)