README.md
Rendering markdown...
# Usage Instructions - CVE-2025-12428 PoC
## Quick Start
### Option 1: Web Browser (Recommended)
1. **Ensure you have a vulnerable browser version:**
- Google Chrome < 142.0.7444.59
- Microsoft Edge (Chromium) < latest patch
2. **Open `exploit.html` in the vulnerable browser**
3. **Click "Run Basic Proof of Concept" or "Run Advanced Exploit"**
4. **Monitor the console output for:**
- Browser crashes
- Memory corruption errors
- Unexpected type coercion
- Invalid memory access warnings
### Option 2: Command Line (Node.js)
Note: Node.js V8 is typically patched, but you can test the code structure:
```bash
npm install # (if needed)
node exploit.js
node test.js
```
## What to Look For
### Indicators of Successful Exploit
1. **Browser Crash**
- Complete browser termination
- "Aw, Snap!" error in Chrome
- Process termination
2. **Console Errors**
- Memory-related errors
- Type confusion warnings
- Unexpected exceptions
3. **Performance Issues**
- Browser slowdown
- High memory usage
- Freezing/hanging
4. **Unexpected Behavior**
- Wrong values returned
- Type mismatches
- Invalid operations succeeding
## Testing Environment Setup
### Isolated VM (Recommended)
1. Set up a virtual machine (VirtualBox, VMware, etc.)
2. Install vulnerable Chrome version
3. Disable network access
4. Run the PoC
5. Monitor for crashes
### Docker Container (Alternative)
```bash
# Run Chrome in isolated container
docker run -it --rm \
-v $(pwd):/workspace \
-e DISPLAY=$DISPLAY \
chrome-vulnerable \
/usr/bin/google-chrome /workspace/exploit.html
```
## Exploit Techniques Explained
### Basic PoC (`exploit.html`)
- Property accessor confusion
- Array index type confusion
- Function type confusion
- Property descriptor manipulation
- Prototype chain manipulation
### Advanced Exploit (`advanced-exploit.js`)
- JIT optimization bypass
- Inline cache (IC) poisoning
- TypedArray view confusion
- Prototype pollution
- Advanced property manipulation
## Troubleshooting
### PoC Doesn't Trigger
1. **Check browser version:**
```javascript
// Run in console
navigator.userAgent
```
2. **Verify vulnerability:**
- Ensure browser is actually vulnerable
- Check if updates have been applied
3. **Try different techniques:**
- Use "Advanced Exploit" button
- Modify exploit parameters
- Increase iteration counts
### Browser Crashes Immediately
- This is actually expected behavior if exploit succeeds!
- Document the crash
- Note which technique triggered it
- Check crash logs
### No Console Output
- Open browser DevTools (F12)
- Check console tab
- Verify JavaScript is enabled
## Responsible Disclosure
If you discover additional details about this vulnerability:
1. **Do NOT** publish full exploits publicly
2. **DO** report to browser vendors
3. **DO** follow responsible disclosure practices
4. **DO** help improve security
## Legal Disclaimer
This PoC is provided for:
- ✅ Security research
- ✅ Educational purposes
- ✅ Vulnerability assessment (authorized only)
- ✅ Security awareness
**NOT for:**
- ❌ Unauthorized access
- ❌ Malicious use
- ❌ Distribution to unauthorized parties
- ❌ Illegal activities
Use at your own risk. The authors assume no liability.