POC Exploit for Chromium Browser Published Online
Indian security researcher Rajvardhan Agarwal has published a PoC exploit for a recently discovered vulnerability affecting Google Chrome, Microsoft Edge and other Chromium-powered browsers such as Opera and Brave. According to him, the PoC exploit was developed for a vulnerability exploited in the Pwn2Own hacking competition, which took place last week.
During the competition, security researchers of the information security company Dataflow Security Bruno Keith and Niklas Baumstark were able to exploit a vulnerability in Chrome and Edge to launch malicious code, for which they received a reward of $ 100 thousand. According to the rules of the competition, details about the issue was reported directly to the Chrome security team so that they can prepare a fix as soon as possible.
Despite the fact that the Chromium developers patched the vulnerability in V8 last week, the patch has not yet been integrated with the official releases of popular Chromium-based browsers, including Chrome, Edge, and others, which are currently still vulnerable to attacks.
However, we must pay tribute to Agarwal - the exploit he published does not allow the attack to be carried out completely. It can be used to run malicious code on the attacked OS (as a rule, this is the second stage of the attack), but to do this, you first need to bypass the browser sandbox (the first stage of the attack). That is, to carry out a full-fledged attack, an attacker first needs to come up with a way to bypass the sandbox, and only after that he will be able to execute the code.
However, the exploit is still a threat as it can be used in attacks against services running embedded / standalone versions of Chromium, where sandboxing protection is not always enabled, as it requires access to very large physical resources.