Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can this BUG be used in this project?SOCK_RAW sockets reachable from Webkit process allows triggering double free in IP6_EXTHDR_CHECK #71

Open
TomYule opened this issue Jan 13, 2021 · 3 comments

Comments

@TomYule
Copy link

TomYule commented Jan 13, 2021

Can this BUG be used in this project?
Maybe 7.55 can use this BUG
https://hackerone.com/reports/943231
https://hackerone.com/theflow0?type=user

@sleirsgoevy
Copy link
Owner

You're not the first to ping me with it. Investigating right now.

@TomYule
Copy link
Author

TomYule commented Jan 13, 2021

Sorry, I'd like to make some contribution to this project, but I don't know how to start;
I am a Java developer, my ps4 system 7.55 I use MacOS development; I see your project is using HTML to call Python and c.
How do I build this project?
CLion? WebStorm?
Just HTML running up ps4 browser access to what address?

@sleirsgoevy
Copy link
Owner

The repository does contain a pre-built copy of the exploit and some payloads, but if you make any changes to the sources you'd need to recompile it. There is a Makefile in src/ for doing that, but you'll need a PS4 on 6.72/7.02, depending on what firmware you are building for.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants