Since the PS4 6.XX JSC_ConcatMemcpy WebKit Exploit, PS4 6.20 WebKit Code Execution Exploit, PS4 Webkit Bad_Hoist Exploit for PS4 FW 6.XX, PS4 Webkit Bad_Hoist 6.72 Exploit Port and PS4JB 6.72 Jailbreak Exploit security researchers 0xdagger of quentinmeffre.fr and abu_y0ussef of mtalbi.github.io who work at SYNACKTIV announced plans to discuss exploiting a 0-day PS4 WebKit vulnerability on 6.xx Firmwares at Black Hat Europe 2020.
This year the annual event will take place virtually from December 7-10th, 2020, and their presentation will outline the exploitation strategy used and the hurdles they encountered along the way for those in the InfoSec field or who are simply interested in learning for fun or to cash in on Bug Bounty Programs.
While most of the PS4 Scene is awaiting someone to make use of the PS4 7.02 Kernel Exploit (KEX) with Mira 7.00-7.02 PS4 WIP Ports already underway, according to @Abkarino of Team Rebug on Twitter to quote: "If it is 6.xx WebKit exploit only, then it will be useless for most unless if it is more stable than the current public one."
And to quote from the event page on BlackHat.com:
This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4 / Github
However, browser-engine hardening techniques together with the total absence of debugging capabilities make it very hard to successfully exploit bugs in the latest PS4 firmwares.
In this talk, we will present how we managed to debug then exploit a 0-day WebKit vulnerability on 6.xx firmwares. The bug has been reported by our fuzzers and is currently under the process of responsible disclosure.
The bug is a Use-after-Free (UAF) vulnerability in WebKit engine. The exploitation of this bug requires a deep understanding of WebKit's primary heap allocator. The key concepts of the allocator as well as the primitives required to massage the heap will be introduced to the audience.
In this talk, we will introduce the root cause of the bug. This bug provides limited exploitation primitives. However, thanks to a weakness we identified in ASLR mechanism, we were able to make this bug exploitable.
In this presentation, we will focus on the exploitation strategy we adopted to get code execution in the context of the browser process and how we turned in particular a Use-After-Free into a R/W primitive leading to code execution.
We will conclude our talk by outlining some of the hurdles we faced while attempting to port the exploit on the latest PS4 firmware.
Cheers to MSZ_MGS for passing along this news earlier today!
This year the annual event will take place virtually from December 7-10th, 2020, and their presentation will outline the exploitation strategy used and the hurdles they encountered along the way for those in the InfoSec field or who are simply interested in learning for fun or to cash in on Bug Bounty Programs.
While most of the PS4 Scene is awaiting someone to make use of the PS4 7.02 Kernel Exploit (KEX) with Mira 7.00-7.02 PS4 WIP Ports already underway, according to @Abkarino of Team Rebug on Twitter to quote: "If it is 6.xx WebKit exploit only, then it will be useless for most unless if it is more stable than the current public one."
And to quote from the event page on BlackHat.com:
This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4 / Github
- Quentin Meffre | Security Researcher, Synacktiv
Mehdi Talbi | Security Researcher, Synacktiv - Date: Thursday, December 10 | 10:20am-11:00am
- Format: 40-Minute Briefings
- Tracks: Exploit Development, Cloud & Platform Security
However, browser-engine hardening techniques together with the total absence of debugging capabilities make it very hard to successfully exploit bugs in the latest PS4 firmwares.
In this talk, we will present how we managed to debug then exploit a 0-day WebKit vulnerability on 6.xx firmwares. The bug has been reported by our fuzzers and is currently under the process of responsible disclosure.
The bug is a Use-after-Free (UAF) vulnerability in WebKit engine. The exploitation of this bug requires a deep understanding of WebKit's primary heap allocator. The key concepts of the allocator as well as the primitives required to massage the heap will be introduced to the audience.
In this talk, we will introduce the root cause of the bug. This bug provides limited exploitation primitives. However, thanks to a weakness we identified in ASLR mechanism, we were able to make this bug exploitable.
In this presentation, we will focus on the exploitation strategy we adopted to get code execution in the context of the browser process and how we turned in particular a Use-After-Free into a R/W primitive leading to code execution.
We will conclude our talk by outlining some of the hurdles we faced while attempting to port the exploit on the latest PS4 firmware.
Cheers to MSZ_MGS for passing along this news earlier today!