Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6778 PoC — Google Chrome 安全漏洞

Source
Associated Vulnerability
Title:Google Chrome 安全漏洞 (CVE-2024-6778)
Description:Race in DevTools in Google Chrome prior to 126.0.6478.182 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)
Readme
CVE-2024-6778
This repository contains proof-of-concept exploits for CVE-2024-6778, which are vulnerabilities in the Chromium web browser that allow a sandbox escape via a browser extension. To run these exploits, you need a version of Chromium older than 126.0.6478.54.

Write-up: https://ading.dev/blog/posts/chrome_sandbox_escape.html

Bug report: https://issues.chromium.org/issues/338248595

CVE-2024-6778 directories contain a proof-of-concept Chrome extension that can execute arbitrary JavaScript on privileged WebUI pages. The CVE-2024-6778 exploit ismore stable.

The sandbox-escape directory contains the full exploit chain, utilizing CVE-2024-6778 to achieve code execution in chrome://policy, ultimately leading to a sandbox escape by manipulating legacy browser support policies.

This repository is licensed under the MIT License.
File Snapshot

[4.0K] /data/pocs/e2c648f79326d67e784f38f60cf58cb0c3557f76 └── [ 846] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →