Chrome V8 engine Sentinel Value leak leads to sandbox escape risk

robot
Abstract generation in progress

Sentinel Value Leak and Chrome V8 HardenProtect Bypass

There are a large number of Sentinel values in the Chrome source code, which are typically used as termination conditions for loops or recursion in algorithms. Recent research has shown that the leakage of certain Sentinel values may lead to arbitrary code execution within the Chrome sandbox.

In addition to the known TheHole object, there are other native objects in V8 that should not be exposed to the JavaScript environment. This article focuses on the Uninitialized Oddball object, which can still be exploited in the latest version of V8 and has not yet been patched.

Exclusive Reveal: Bypassing Chrome v8 HardenProtect through Leaked Sentinel Value

It is worth noting that this method has wide applicability. In several reported vulnerabilities, the leakage of Uninitialized Oddball could lead to remote code execution. This highlights the necessity for a thorough audit of software that may be affected by PatchGap.

Most native objects in V8 are defined in the v8/src/roots/roots.h file, and they are arranged adjacently in memory. Once these objects are incorrectly exposed to JavaScript, arbitrary code execution within the sandbox may be achieved.

Exclusive reveal on bypassing Chrome v8 HardenProtect through leaked Sentinel Value

To verify this method, we can modify the native functions of V8 to return an Uninitialized Oddball object. In this way, we can achieve relatively arbitrary memory reads in the latest version of V8.

Exclusive Reveal: How to Bypass Chrome v8 HardenProtect through the Leak of Sentinel Value

The core of this bypass method lies in the fact that the optimized JavaScript function does not sufficiently check the type information of the array when accessing its elements, but rather directly calculates the offset to retrieve the value. This leads to type confusion, allowing arbitrary reads.

Exclusive reveal on bypassing Chrome v8 HardenProtect through leaked Sentinel Value

The suggested fix is to add a check for the array map when returning array elements from the optimized function, avoiding the direct calculation of array values via offsets.

Exclusive Reveal on Bypassing Chrome v8 HardenProtect through Sentinel Value Leak

In addition, we also need to pay attention to the potential Patch Gap issues that may exist in the software supply chain. Some widely used software may still have not patched such vulnerabilities, providing potential entry points for attackers.

Exclusive Reveal: Bypassing Chrome v8 HardenProtect through leaked Sentinel Value

Overall, there are various Sentinel values present in V8, and their leakage may lead to security issues. Future research directions may include: exploring the effects of other Uninitialized Oddball leaks, assessing the feasibility of introducing Sentinel values as variables in fuzz testing, and more comprehensively examining the related security issues. Regardless of whether these issues are formally classified as security vulnerabilities, they could significantly shorten the time for attackers to achieve complete exploitation.

Exclusive Reveal on Bypassing Chrome v8 HardenProtect through Leaked Sentinel Value

Exclusive Reveal on Bypassing Chrome v8 HardenProtect through Leaking Sentinel Value

Exclusive reveal on bypassing Chrome v8 HardenProtect through leaked Sentinel Value

SENC1.87%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
LiquidatedDreamsvip
· 08-08 20:23
Another wave of holes... why doesn't the broken Chrome get fixed?
View OriginalReply0
GasWastervip
· 08-08 20:22
There are so many loopholes in the box, fam.
View OriginalReply0
GasOptimizervip
· 08-08 20:20
Recursive vulnerabilities accounted for 89.4% of security incidents.
View OriginalReply0
FallingLeafvip
· 08-08 20:19
The vulnerabilities are so big that the browser is no longer safe.
View OriginalReply0
GateUser-5854de8bvip
· 08-08 20:00
Tsk, v8 has a vulnerability again.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)