Exploiting V8 at openECSC

from blog lyra's epic blog!, | ↗ original
Despite having 7 Chrome CVEs, I’ve never actually fully exploited a memory corruption in its V8 JavaScript engine before. Baby array.xor, a challenge at this year’s openECSC CTF, was my first time going from a V8 bug to popping a /bin/sh shell. Most V8 exploits tend to have two stages to them - figuring out a unique way to trigger some sort of a...