• XSS.stack #1 – первый литературный журнал от юзеров форума

Мануал/Книга [BlackHat Asia 2025] Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript in V8 Description

weaver

31 c0 bb ea 1b e6 77 66 b8 88 13 50 ff d3
Забанен
Регистрация
19.12.2018
Сообщения
3 301
Решения
11
Реакции
4 622
Депозит
0.0001
Пожалуйста, обратите внимание, что пользователь заблокирован
Description
As WebAssembly becomes more integrated into modern web browsers, its interaction with JavaScript creates new opportunities for performance optimization, but also introduces significant security risks. This presentation dives deep into the vulnerabilities emerging from the boundaries between WebAssembly and JavaScript, with a focus on type confusion issues and improper handling of object boundaries within the V8 engine.

Through our research, we have uncovered multiple vulnerabilities in V8, including type confusion between WasmObject and JSObject, as well as issues with the WebAssembly Garbage Collection (WasmGC) and JavaScript Promise Integration (JSPI) API. These vulnerabilities have serious implications for browser security, and could lead to crashes, out-of-bounds accesses, or even remote code execution.

We will discuss several CVEs, including CVE-2024-5158, CVE-2024-7550, CVE-2024-3156, CVE-2024-8638, and CVE-2024-5838, and explain how these issues were identified, the technical details behind them, and the patches submitted to resolve them. Our goal is to highlight the importance of thorough security reviews and the need for improved safety checks at the WebAssembly-JavaScript interface.
blackhat.com/asia-25/briefings/schedule/#bridging-the-gap-type-confusion-and-boundary-vulnerabilities-between-webassembly-and-javascript-in-v-43510

слайды:
http://i.blackhat.com/Asia-25/Asia-25-Zhenghang-Bridging-the-Gap.pdf
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх