Lucene search

K
zdi@jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_GatechZDI-20-672
HistoryMay 27, 2020 - 12:00 a.m.

(Pwn2Own) Apple Safari In Operator JIT Type Confusion Remote Code Execution Vulnerability

2020-05-2700:00:00
@jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech
www.zerodayinitiative.com
17

0.482 Medium

EPSS

Percentile

97.5%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the HasIndexedProperty DFG node. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.